, 0x80, 0x0) 17:11:07 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000002c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000000280)=[@authinfo={0x10}], 0x10}, 0x0) 17:11:07 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0x101, &(0x7f0000000600), &(0x7f0000000140)=0x98) 17:11:07 executing program 1: getresgid(0x0, 0x0, &(0x7f0000000080)) 17:11:07 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:07 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000000200), &(0x7f00000002c0)=0x90) 17:11:07 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x0, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 17:11:07 executing program 0: select(0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)={0x0, 0x9}) 17:11:07 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f00000003c0), &(0x7f0000000480)=0x90) 17:11:07 executing program 1: sendmsg$unix(0xffffffffffffff9c, &(0x7f0000002100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001ec0)=[@cred], 0x68}, 0x0) 17:11:07 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x0, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 17:11:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003840)={&(0x7f0000001440)=@file={0xa}, 0xa, 0x0, 0x0, &(0x7f0000003540)=[@cred, @rights, @cred], 0xe8, 0x100}, 0x80) 17:11:07 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:07 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(r0, &(0x7f0000000740)={0x1c, 0x1c, 0x2}, 0x1c) 17:11:07 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 17:11:07 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:07 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 17:11:07 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x0, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 17:11:07 executing program 2: pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getpeername(r0, 0x0, &(0x7f0000000280)) 17:11:07 executing program 1: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000080)='dctcp\x00', 0x6) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0x40, &(0x7f0000000040)='dctcp\x00', 0x6) 17:11:07 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000240)=@in6={0x1c, 0x1c, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xffffffffffffff5f, 0x1c, 0x2}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) shutdown(r1, 0x0) 17:11:07 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f00000002c0)=ANY=[@ANYBLOB="001c"], 0x104) [ 1158.107387][T11919] tmpfs: Bad value for 'nr_blocks' 17:11:08 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x0, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 17:11:08 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:08 executing program 2: readlinkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:11:08 executing program 1: getpeername(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socket$inet6_sctp(0x1c, 0x0, 0x84) connect$inet(0xffffffffffffff9c, &(0x7f00000003c0)={0x10, 0x2}, 0x10) 17:11:08 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x1c, 0x1c, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) 17:11:08 executing program 2: r0 = socket$inet(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x1f, &(0x7f0000000140), &(0x7f0000000180)=0x4) 17:11:08 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x0, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 17:11:08 executing program 4: socketpair(0x1, 0x3, 0x4, 0x0) [ 1158.284867][T11940] tmpfs: Bad value for 'nr_blocks' 17:11:08 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:08 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000080)={0x4d, 0x1c}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) 17:11:08 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f0000000140), 0x4) 17:11:08 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x0, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 17:11:08 executing program 4: r0 = open(&(0x7f0000000100)='./file1\x00', 0x1433c2, 0x0) ftruncate(r0, 0x2210004) r1 = epoll_create(0xabcb) sendfile(r1, r0, 0x0, 0xf10000) truncate(&(0x7f0000000040)='./file1\x00', 0x0) futimesat(r0, 0x0, 0x0) [ 1158.471174][T11968] tmpfs: Bad value for 'nr_blocks' 17:11:08 executing program 0: semget(0x3, 0x0, 0x170) 17:11:08 executing program 1: setsockopt$inet6_tcp_buf(0xffffffffffffff9c, 0x6, 0x0, 0x0, 0x0) 17:11:08 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x0, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 17:11:08 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f00000015c0)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, &(0x7f0000001540)=[{&(0x7f00000000c0)='X', 0x1}], 0x1, &(0x7f0000001780)=[{0x10}, {0x10}], 0x20}, 0x0) 17:11:08 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x3}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) recvmsg(r1, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=""/213, 0xd5}, 0x40002) 17:11:08 executing program 2: shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000b00)={{0x0, 0xffffffffffffffff}}) 17:11:08 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x0, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 17:11:08 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@dstaddrv6={0x1c, 0x84, 0xa, @remote={0xfe, 0x80, '\x00', 0x0}}, @init={0x14}], 0x30}, 0x0) 17:11:08 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) 17:11:08 executing program 0: sendmsg$unix(0xffffffffffffff9c, &(0x7f0000002100)={&(0x7f0000000000)=@file={0xa}, 0xa, 0x0}, 0x0) 17:11:08 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x10, &(0x7f0000000e00)=0x5, 0x4) 17:11:08 executing program 5: clock_nanosleep(0xe, 0x0, &(0x7f0000000080), 0x0) 17:11:08 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x0, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 17:11:08 executing program 4: sendmsg$unix(0xffffffffffffff9c, &(0x7f0000002100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001ec0)}, 0x0) 17:11:08 executing program 0: semget$private(0x0, 0x6, 0x0) 17:11:08 executing program 2: pipe2(&(0x7f0000000200), 0x0) getresgid(0x0, 0x0, &(0x7f0000001800)) 17:11:08 executing program 1: syz_emit_ethernet(0x26, &(0x7f00000003c0)={@broadcast, @remote, @val, {@ipv4}}, 0x0) 17:11:08 executing program 5: getresgid(0x0, &(0x7f0000000880), 0x0) 17:11:08 executing program 4: select(0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000280)={0x101}) 17:11:08 executing program 0: select(0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)={0x101}) 17:11:08 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x0, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 17:11:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x51, &(0x7f00000002c0)={0x6, {{0x10, 0x2}}}, 0x88) 17:11:08 executing program 2: sendmsg$unix(0xffffffffffffffff, &(0x7f0000003840)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003540)=[@cred, @cred], 0xd0}, 0x0) 17:11:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003840)={&(0x7f0000001440)=@file={0xa}, 0xa, &(0x7f0000001a00)=[{&(0x7f0000001480)="bc40719704c4a0a6cacffa3b26c4a9a99769c0f38325443c4f777b0f6dd942a1913621ddef5ccb81faed4fe6149b4f0e50c0184f1d83afb9a74c34bbb9cac856b5556a6c632213a2ae354ca9188cc31da4ccfb9fabebc95dc1e37395", 0x5c}, {&(0x7f0000001580)="8a", 0x1}, {0x0}], 0x3, &(0x7f0000003540)=[@cred, @rights, @cred], 0xe8}, 0x80) 17:11:08 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) dup2(r1, r0) 17:11:08 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000006c0)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) 17:11:08 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x0, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 17:11:08 executing program 5: syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @broadcast, @val, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x0, 0x0, @broadcast, "", @broadcast, "d49dd5fb131b5d1251eb0703ec198e80"}}}}, 0x0) 17:11:09 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0x1c, 0x1c, 0x2}, 0x1c) 17:11:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) recvmsg(r0, &(0x7f0000001800)={0x0, 0x0, 0x0}, 0x43) 17:11:09 executing program 4: getpeername$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 17:11:09 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000080)={0x10001}, 0x0) 17:11:09 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, 0x0, 0x0) 17:11:09 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup(r0) r2 = socket$inet(0x2, 0x5, 0x0) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r3, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) r4 = dup2(r3, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f0000000040)=ANY=[@ANYBLOB="01", @ANYRES32=0x0], &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x15, &(0x7f0000000000)={r5}, &(0x7f0000000040)=0x8) 17:11:09 executing program 2: open$dir(0x0, 0x408a00, 0x0) 17:11:09 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f0000000080), 0xc) 17:11:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x46, 0x0, 0x0) 17:11:09 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000240)=@in6={0x1c, 0x1c, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xffffffffffffff5f, 0x1c, 0x2}, 0x1c) sendmsg$inet_sctp(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="f5", 0x1}], 0x1, &(0x7f0000000300)=[@prinfo={0x14}], 0x14}, 0x0) 17:11:09 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r0) connect$inet6(r2, &(0x7f00000000c0)={0x1c, 0x1c, 0x1}, 0x1c) 17:11:09 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000380)={0x1c, 0x1c, 0x3}, 0x1c) 17:11:09 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, 0x0, 0x0) 17:11:09 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x20, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 17:11:10 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, 0x0, 0x0) 17:11:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003840)={0x0, 0x0, &(0x7f0000001a00)=[{0x0}], 0x1, &(0x7f0000003540)=[@cred], 0x68}, 0x0) 17:11:10 executing program 0: r0 = socket$inet6(0x1c, 0x5, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1002, &(0x7f0000000040)=0x3, 0x4) 17:11:10 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003840)={0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000001480)="bc", 0x1}], 0x1}, 0x80) 17:11:10 executing program 1: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) getpeername$inet6(r0, 0x0, &(0x7f0000000040)) 17:11:10 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000080), &(0x7f0000000140)=0x10) 17:11:10 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x0, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 17:11:10 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x0, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 17:11:10 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000021c0), 0x0, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, 0x0) 17:11:10 executing program 4: ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f00000022c0)) io_uring_setup(0x6a62, &(0x7f0000004340)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(0xffffffffffffffff, &(0x7f00000045c0)={&(0x7f0000004500), 0xc, 0x0, 0x1, 0x0, 0x0, 0x48040}, 0x0) 17:11:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f0000001540)=ANY=[@ANYBLOB='d'], 0x1c}}, 0x0) 17:11:10 executing program 5: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x890d, 0x0) 17:11:10 executing program 1: syz_mount_image$romfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)) 17:11:10 executing program 0: r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080), 0x202, 0x0) ioctl$SNDCTL_DSP_GETOPTR(r0, 0x800c5012, &(0x7f0000000040)) 17:11:10 executing program 2: io_uring_setup(0xb07, &(0x7f0000000180)) r0 = io_uring_setup(0x7ce4, &(0x7f0000000280)) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x10000000) 17:11:10 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x0, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 17:11:10 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$SOUND_MIXER_READ_RECMASK(r0, 0x80044dfd, &(0x7f00000003c0)) 17:11:11 executing program 5: r0 = io_uring_setup(0xb07, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_PROBE(r0, 0xe, 0x0, 0xb) 17:11:11 executing program 2: perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0xd1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:11:11 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, 0x0, &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) creat(&(0x7f0000000400)='./file0/file1\x00', 0x0) 17:11:11 executing program 4: r0 = syz_io_uring_setup(0x53f9, &(0x7f0000000200)={0x0, 0xaf34}, &(0x7f00006ce000/0xd000)=nil, &(0x7f0000752000/0xf000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x10000000) io_uring_setup(0x159, &(0x7f0000000100)) syz_io_uring_setup(0x106f, &(0x7f0000000000), &(0x7f0000400000/0xc00000)=nil, &(0x7f0000758000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 17:11:11 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x0, 0xfffffffe}, 0x40) 17:11:11 executing program 0: r0 = io_uring_setup(0x5e99, &(0x7f0000000080)) io_uring_enter(r0, 0x0, 0x0, 0x1, 0x0, 0x0) 17:11:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}]}, 0x1c}}, 0x0) [ 1161.316166][T12183] loop1: detected capacity change from 0 to 4096 17:11:11 executing program 5: syz_mount_image$romfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)={[{'\\,(*\''}], [{@smackfsdef={'smackfsdef', 0x3d, '{@*\xe9!.'}}]}) 17:11:11 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, 0x0, &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:11 executing program 4: r0 = io_uring_setup(0xb07, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_PROBE(r0, 0x2, 0x0, 0xb) [ 1161.383030][T12183] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 17:11:11 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, 0x0, &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1161.491585][T12207] romfs: Unknown parameter '\' 17:11:11 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000040)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) creat(&(0x7f0000000400)='./file0/file1\x00', 0x0) 17:11:11 executing program 2: syz_mount_image$romfs(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)) 17:11:11 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) [ 1161.571229][T12207] romfs: Unknown parameter '\' 17:11:11 executing program 5: syz_io_uring_setup(0x4a9, &(0x7f00000001c0)={0x0, 0x0, 0x6, 0x2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 17:11:11 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x93c, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1}, 0x40) 17:11:11 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:11 executing program 5: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8932, &(0x7f0000000000)) 17:11:11 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8927, &(0x7f0000000000)) 17:11:11 executing program 4: r0 = io_uring_setup(0xb07, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_PROBE(r0, 0xf, 0x0, 0xb) 17:11:11 executing program 0: r0 = io_uring_setup(0xb07, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_PROBE(r0, 0x10, 0x0, 0xb) [ 1161.696773][T12233] loop1: detected capacity change from 0 to 4096 [ 1161.759876][T12233] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 17:11:11 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:11 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000ef6d09"], 0x1c}}, 0x0) 17:11:11 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000004240), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, 0x0, 0x32) 17:11:11 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f00000045c0)={&(0x7f0000004500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000004580)={&(0x7f0000004540)={0x14}, 0x14}}, 0x0) 17:11:11 executing program 5: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x891b, &(0x7f0000000000)) 17:11:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)=@can_delroute={0x13, 0x19, 0x1609, 0x0, 0x0, {}, [@CGW_MOD_AND={0x15, 0x1, {{{}, 0x0, 0x0, 0x0, 0x0, "859a10e461e03b22"}}}, @CGW_CS_XOR={0x8}]}, 0x34}}, 0x0) 17:11:11 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x0, 0x0, 0xfffffffe}, 0x40) 17:11:11 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:11 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000140), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000040)=0x1) 17:11:11 executing program 4: r0 = io_uring_setup(0xb07, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_PROBE(r0, 0x13, &(0x7f0000000200)=ANY=[], 0xb) 17:11:11 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @local, 0x0, 0x1}}) 17:11:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 17:11:11 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8922, &(0x7f0000000000)) 17:11:12 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:12 executing program 5: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r0, &(0x7f0000e5c000)={0x2, 0x4e20, @empty}, 0x10) 17:11:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r1, &(0x7f00000000c0)={0x1f, @none}, 0x8) 17:11:12 executing program 2: sendmsg$NL802154_CMD_GET_SEC_KEY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r0 = syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r0, 0x0, 0x70bd28, 0x25dfdbfd, {}, [@L2TP_ATTR_COOKIE={0xc, 0xf, 0x2}, @L2TP_ATTR_PEER_SESSION_ID={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40002) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x34, 0x0, 0x0, 0x70bd2b, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}]}, 0x34}}, 0x40800) accept4$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000005c0)=0x14, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in=@broadcast, @in=@empty}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, 0x0) socket(0x5, 0x2, 0x0) 17:11:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000100)="9f98ee79c654e37011c19110415bd5b6", 0x10) [ 1162.170626][T12287] batadv0: mtu less than device minimum 17:11:12 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[], 0x16) r2 = socket$netlink(0x10, 0x3, 0x6) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x45, 0xda1, 0x0) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 17:11:12 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:12 executing program 0: r0 = socket(0x18, 0x0, 0x2) bind$alg(r0, &(0x7f0000000680)={0x26, 'hash\x00', 0x0, 0x0, 'streebog256-generic\x00'}, 0x58) 17:11:12 executing program 2: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) connect$inet(r0, &(0x7f0000e5c000)={0x2, 0x0, @empty}, 0x10) 17:11:12 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, 0x0) syz_open_dev$loop(&(0x7f00000021c0), 0x0, 0x0) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f00000022c0)) read$FUSE(0xffffffffffffffff, &(0x7f0000002300)={0x2020}, 0x2020) io_uring_setup(0x6a62, &(0x7f0000004340)={0x0, 0x0, 0x4, 0x0, 0x0, 0x0, r0}) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000004440)) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r1, &(0x7f00000045c0)={&(0x7f0000004500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000004580)={&(0x7f0000004540)={0x14, 0x0, 0x3694d443b4568fb4}, 0x14}, 0x1, 0x0, 0x0, 0x48040}, 0x0) [ 1162.339995][T12305] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1162.377922][T12307] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 17:11:12 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:12 executing program 0: syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000500)={0x0}}, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/ipc\x00') 17:11:12 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'tunl0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x29, 0x0, @rand_addr, @loopback}}}}) 17:11:13 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) 17:11:13 executing program 2: io_uring_setup(0xb07, &(0x7f0000000180)) r0 = io_uring_setup(0x7ce4, &(0x7f0000000280)) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x10000000) syz_io_uring_setup(0x25e8, &(0x7f0000000000), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 17:11:13 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x80000001}, 0x40) 17:11:13 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:13 executing program 0: perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x20000200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:11:13 executing program 1: socket(0xa, 0x0, 0x65f9) 17:11:13 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_tracing={0x1a, 0x3, &(0x7f00000003c0)=@framed, &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:13 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @mcast1}}) 17:11:13 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:13 executing program 1: r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0x0) 17:11:13 executing program 0: syz_mount_image$romfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8, 0x1, &(0x7f0000000180)=[{&(0x7f0000000080)='W', 0x1}], 0x2020040, &(0x7f00000001c0)={[], [{@fowner_eq}]}) 17:11:13 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8946, &(0x7f0000000000)) 17:11:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, 0x0, 0x0) 17:11:13 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:13 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKFRASET(r0, 0x1264, 0x0) 17:11:13 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000004440)) 17:11:13 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000040)={{0x3}, 0x0, 0x0, 'id1\x00', 'timer0\x00'}) 17:11:13 executing program 5: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8906, 0x0) 17:11:13 executing program 2: sendmsg$NL802154_CMD_GET_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) 17:11:13 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000da"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:13 executing program 0: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r0, &(0x7f0000e5c000)={0x2, 0x0, @empty}, 0x10) 17:11:13 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000004440)) 17:11:13 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000040)) 17:11:13 executing program 2: syz_mount_image$romfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000080)='W', 0x1}], 0x0, 0x0) 17:11:13 executing program 5: r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, 0x0, 0x0) 17:11:13 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000da"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:13 executing program 1: syz_mount_image$romfs(0x0, &(0x7f0000000040)='./file0\x00', 0x8, 0x1, &(0x7f0000000180)=[{&(0x7f0000000080)='W', 0x1}], 0x0, 0x0) 17:11:13 executing program 4: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8942, &(0x7f0000000000)) 17:11:13 executing program 0: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8990, &(0x7f0000000000)) 17:11:13 executing program 5: set_mempolicy(0x0, &(0x7f00000005c0), 0x1ff) 17:11:13 executing program 2: syz_mount_image$romfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8, 0x1, &(0x7f0000000180)=[{&(0x7f0000000080)='W', 0x1}], 0x2020040, &(0x7f00000001c0)={[{'}'}], [{@fowner_eq}]}) 17:11:13 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000da"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:13 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000600)) 17:11:13 executing program 0: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 17:11:13 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 17:11:13 executing program 5: r0 = socket(0x11, 0xa, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={0x0}}, 0x0) 17:11:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000940)={'gre0\x00', &(0x7f0000000340)=ANY=[]}) 17:11:13 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb00"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:13 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)) 17:11:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000680), 0xffffffffffffffff) 17:11:13 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x14}, 0x40) 17:11:13 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x40) 17:11:13 executing program 0: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8937, &(0x7f0000000000)) 17:11:13 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb00"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4, 0x0, @rand_addr, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp={0x44, 0x4}]}}}}}) 17:11:13 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0x0, 0x0, 0x2}, 0x40) 17:11:13 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8916, 0x0) 17:11:14 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x93c, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x40) 17:11:14 executing program 4: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8970, &(0x7f0000000000)) 17:11:14 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_SEC_DEV(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)={0x14, r1, 0x1}, 0x14}}, 0x0) 17:11:14 executing program 5: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8934, &(0x7f0000000000)) 17:11:14 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x5452, &(0x7f0000000000)) 17:11:14 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb00"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:14 executing program 4: syz_open_dev$loop(0x0, 0x0, 0x0) io_uring_setup(0x6a62, &(0x7f0000004340)={0x0, 0x0, 0x4}) 17:11:14 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r0, 0x5420, 0x0) 17:11:14 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000080)={0x1c, r4, 0x1, 0x0, 0x0, {{0x2}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="80"], 0x80}}, 0x0) sendfile(r3, r2, 0x0, 0x100000002) 17:11:14 executing program 1: r0 = io_uring_setup(0xb07, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_PROBE(r0, 0x9, 0x0, 0xb) 17:11:14 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb0000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:14 executing program 2: syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) socket(0x9, 0x0, 0x0) 17:11:14 executing program 4: r0 = socket(0x11, 0x3, 0x0) accept4$packet(r0, 0x0, 0x0, 0x0) 17:11:14 executing program 0: r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000140)={0x0, 0x1, 0x6, @link_local}, 0x10) 17:11:14 executing program 2: r0 = io_uring_setup(0xb07, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_PROBE(r0, 0xb, 0x0, 0xb) 17:11:14 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000021c0), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000002200)) 17:11:14 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb0000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:14 executing program 1: r0 = socket(0x11, 0xa, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 17:11:14 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={0x0}}, 0x0) sendmsg$IEEE802154_LLSEC_LIST_DEV(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={0x0}}, 0x0) [ 1164.476201][ T37] kauditd_printk_skb: 5 callbacks suppressed [ 1164.476216][ T37] audit: type=1804 audit(1630516274.326:972): pid=12490 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir445065182/syzkaller.4qFCLn/3594/cgroup.controllers" dev="sda1" ino=15453 res=1 errno=0 17:11:14 executing program 0: r0 = io_uring_setup(0xb07, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_PROBE(r0, 0xd, 0x0, 0xb) 17:11:14 executing program 5: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14}, 0x14}}, 0x0) 17:11:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000940)={'gre0\x00', 0x0}) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 17:11:14 executing program 1: r0 = io_uring_setup(0x5e99, &(0x7f0000000080)={0x0, 0x0, 0x2}) io_uring_enter(r0, 0x0, 0xda36, 0x1, &(0x7f0000000100), 0x8) 17:11:14 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb0000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:14 executing program 0: io_uring_setup(0x6a62, &(0x7f0000004340)={0x0, 0x0, 0x0, 0x0, 0xf}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 17:11:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_MRU={0x6}]}, 0x24}}, 0x0) 17:11:14 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:14 executing program 2: syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, 0x0) syz_open_dev$loop(&(0x7f00000021c0), 0x0, 0x0) io_uring_setup(0x6a62, &(0x7f0000004340)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 17:11:14 executing program 4: syz_mount_image$romfs(0x0, 0x0, 0x8, 0x0, &(0x7f0000000180), 0x0, 0x0) 17:11:14 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x53, 0x0, 0x0) 17:11:14 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0}, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000140)="11", 0x1}], 0x1, &(0x7f0000000280)=[{0xc}, {0xc}], 0x18}, 0x0) 17:11:14 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000100), 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x4) 17:11:14 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:14 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000140), 0x4) 17:11:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="03000005000000000065352d0eaf1630838f21329e1844622eac64513781243f2336d2455070fc692a1ac6c4653a459e428e49a7101a194e284bab7636b7b5557ebc60f0b0fa54bfd19c00c467cfa543638de201938f3aa46e0549a1fb15137868b59e446f21e1f3d2f1c53fe01c3380e051770bc40d57c1aef93da2fdf072c135f78213f736ac4a6a474f91820d213d787b1203dc00a2bfdc45d7e6142706f77f53e11e25755d9bf090789d0f043ab89ba4d279105b3c1612b13e846a312cf4d8def6f90cec4ac7f9843ff878cce8b57d1f09c16278dcfb3d851fd426963f729eb9ed99c195404d4078881628d7d8939ed0a3ae322ff9fc1acf1342291c3ba6ad62e503b106d8939a66165c099edbbb59f2db5889c96797e0b6fe42cf4c5118a5", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:15 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x7ffff000}}, 0x0) 17:11:15 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:15 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:15 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)={0x180, r2, 0x20, 0x70bd29, 0x25dfdbfc, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x168, 0x2, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}]}]}, 0x180}, 0x1, 0x0, 0x0, 0x48041}, 0x40000) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) 17:11:15 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:15 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)={0x180, r2, 0x20, 0x70bd29, 0x25dfdbfc, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x168, 0x2, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}]}]}, 0x180}, 0x1, 0x0, 0x0, 0x48041}, 0x40000) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) 17:11:15 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r4, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r6, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r8, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYRESDEC=r5, @ANYRES16=r9, @ANYRES32], 0x30}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) 17:11:15 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:15 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1165.693534][T12584] tmpfs: Too small a size for current use [ 1165.726694][T12590] loop1: detected capacity change from 0 to 256 17:11:15 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) [ 1165.793152][T12590] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 17:11:15 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)={0x180, r2, 0x20, 0x70bd29, 0x25dfdbfc, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x168, 0x2, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}]}]}, 0x180}, 0x1, 0x0, 0x0, 0x48041}, 0x40000) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) 17:11:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="03000005000000000065352d0eaf1630838f21329e1844622eac64513781243f2336d2455070fc692a1ac6c4653a459e428e49a7101a194e284bab7636b7b5557ebc60f0b0fa54bfd19c00c467cfa543638de201938f3aa46e0549a1fb15137868b59e446f21e1f3d2f1c53fe01c3380e051770bc40d57c1aef93da2fdf072c135f78213f736ac4a6a474f91820d213d787b1203dc00a2bfdc45d7e6142706f77f53e11e25755d9bf090789d0f043ab89ba4d279105b3c1612b13e846a312cf4d8def6f90cec4ac7f9843ff878cce8b57d1f09c16278dcfb3d851fd426963f729eb9ed99c195404d4078881628d7d8939ed0a3ae322ff9fc1acf1342291c3ba6ad62e503b106d8939a66165c099edbbb59f2db5889c96797e0b6fe42cf4c5118a5", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) [ 1165.848356][T12602] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:11:15 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 17:11:15 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) [ 1165.889404][T12605] tmpfs: Too small a size for current use [ 1165.911962][T12602] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:11:15 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:15 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)={0x180, r2, 0x20, 0x70bd29, 0x25dfdbfc, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x168, 0x2, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}]}]}, 0x180}, 0x1, 0x0, 0x0, 0x48041}, 0x40000) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:15 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 17:11:15 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r4, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r6, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r8, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYRESDEC=r5, @ANYRES16=r9, @ANYRES32], 0x30}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) [ 1165.971852][T12614] loop1: detected capacity change from 0 to 256 [ 1166.002484][T12614] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 17:11:15 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) [ 1166.054827][T12614] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: casefold flag without casefold feature [ 1166.087871][T12614] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 1166.094811][T12614] EXT4-fs (loop1): mount failed 17:11:15 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:15 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) [ 1166.106075][T12626] tmpfs: Too small a size for current use [ 1166.114218][T12628] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:11:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) [ 1166.156491][T12628] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:11:16 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:16 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:16 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r4, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r6, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r8, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYRESDEC=r5, @ANYRES16=r9, @ANYRES32], 0x30}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) 17:11:16 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) [ 1166.253280][T12639] loop1: detected capacity change from 0 to 256 [ 1166.267942][T12641] tmpfs: Too small a size for current use 17:11:16 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:16 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) [ 1166.301519][T12639] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 1166.309798][T12646] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:11:16 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1166.354823][T12639] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: casefold flag without casefold feature [ 1166.360573][T12646] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1166.377098][T12639] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 1166.395212][T12639] EXT4-fs (loop1): mount failed 17:11:16 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:16 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r4, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r6, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r8, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYRESDEC=r5, @ANYRES16=r9, @ANYRES32], 0x30}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) 17:11:16 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) [ 1166.477530][T12658] tmpfs: Too small a size for current use 17:11:16 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:16 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:16 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:16 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) [ 1166.553292][T12670] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1166.586465][T12672] loop1: detected capacity change from 0 to 256 17:11:16 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1166.595930][T12670] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1166.623366][T12672] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 17:11:16 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:16 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:16 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB, @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:16 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) [ 1166.675071][T12672] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: casefold flag without casefold feature [ 1166.701909][T12672] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 1166.708570][T12672] EXT4-fs (loop1): mount failed 17:11:16 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:16 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:16 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:16 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) [ 1166.782108][T12694] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1166.801462][T12694] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:11:16 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00'}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 17:11:16 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB, @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:16 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) [ 1166.881829][T12704] loop1: detected capacity change from 0 to 256 17:11:16 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:16 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) [ 1166.928136][T12704] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 17:11:16 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00'}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 1166.973308][T12704] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: casefold flag without casefold feature 17:11:16 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:16 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:16 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00'}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 1167.029461][T12704] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 1167.036057][T12704] EXT4-fs (loop1): mount failed 17:11:16 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:16 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:16 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB, @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:17 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:17 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1167.183362][T12738] loop1: detected capacity change from 0 to 256 17:11:17 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:17 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:17 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1167.223612][T12738] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 17:11:17 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) [ 1167.286428][T12738] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: casefold flag without casefold feature 17:11:17 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:17 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) [ 1167.371896][T12738] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 1167.380139][T12738] EXT4-fs (loop1): mount failed 17:11:17 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:17 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:17 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:17 executing program 5: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:17 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:17 executing program 5: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:17 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1167.589670][T12772] loop1: detected capacity change from 0 to 256 17:11:17 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:17 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:17 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:17 executing program 5: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:17 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:17 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:17 executing program 5: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:17 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:17 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) [ 1167.804410][T12796] loop1: detected capacity change from 0 to 256 17:11:17 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:17 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:17 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:17 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:17 executing program 5: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:17 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:17 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) [ 1167.974085][T12809] loop1: detected capacity change from 0 to 256 17:11:17 executing program 5: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:17 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:17 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:17 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:18 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:18 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:18 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:18 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:18 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="0000000000000000181000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:18 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1168.213259][T12842] loop1: detected capacity change from 0 to 256 17:11:18 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:18 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:18 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:18 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:18 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="0000000000000000181000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:18 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:18 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:18 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:18 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) [ 1168.385567][T12863] loop1: detected capacity change from 0 to 256 17:11:18 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="0000000000000000181000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:18 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', 0x0, 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:18 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:18 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:18 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:18 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:18 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:18 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="000000000000000018100000", @ANYRES32=r0, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1168.600787][T12886] loop1: detected capacity change from 0 to 256 17:11:18 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:18 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:18 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x81, &(0x7f0000000000)) 17:11:18 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:18 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="000000000000000018100000", @ANYRES32=r0, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:18 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:18 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:18 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:18 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x81, &(0x7f0000000000)) 17:11:18 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:18 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="000000000000000018100000", @ANYRES32=r0, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:18 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:18 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:18 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:18 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:18 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x81, &(0x7f0000000000)) 17:11:18 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:18 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32, @ANYBLOB="000000000000000018100000", @ANYRES32=r0, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 17:11:18 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:18 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}], 0x81, &(0x7f0000000000)) 17:11:18 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:19 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:19 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:19 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32, @ANYBLOB="000000000000000018100000", @ANYRES32=r0, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 17:11:19 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) [ 1169.140446][T12945] loop1: detected capacity change from 0 to 4 [ 1169.159963][T12945] EXT4-fs (loop1): bad geometry: block count 54 exceeds size of device (2 blocks) 17:11:19 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}], 0x81, &(0x7f0000000000)) 17:11:19 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:19 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:19 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:19 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32, @ANYBLOB="000000000000000018100000", @ANYRES32=r0, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 17:11:19 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r5, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:19 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) [ 1169.370333][T12968] loop1: detected capacity change from 0 to 4 [ 1169.399429][T12968] EXT4-fs (loop1): bad geometry: block count 54 exceeds size of device (2 blocks) 17:11:19 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:19 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r5, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:19 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:19 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:19 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}], 0x81, &(0x7f0000000000)) 17:11:19 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:19 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, 0x0) [ 1169.570496][T12991] loop1: detected capacity change from 0 to 4 17:11:19 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r5, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:19 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:19 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:19 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) [ 1169.619911][T12991] EXT4-fs (loop1): bad geometry: block count 54 exceeds size of device (2 blocks) 17:11:19 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0}], 0x81, &(0x7f0000000000)) 17:11:19 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:19 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, 0x0) 17:11:19 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r2, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:19 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:19 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:19 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1169.775266][T13013] loop1: detected capacity change from 0 to 4 [ 1169.811004][T13013] EXT4-fs (loop1): bad geometry: block count 54 exceeds size of device (2 blocks) 17:11:19 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, 0x0) 17:11:19 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r2, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:19 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0}], 0x81, &(0x7f0000000000)) 17:11:19 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:19 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:19 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:19 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:19 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r2, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:19 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)) [ 1169.970508][T13036] loop1: detected capacity change from 0 to 4 [ 1170.005978][T13036] EXT4-fs (loop1): bad geometry: block count 54 exceeds size of device (2 blocks) 17:11:19 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:19 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:19 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="03000005000000000065352d0eaf1630838f21329e1844622eac64513781243f2336d2455070fc692a1ac6c4653a459e428e49a7101a194e284bab7636b7b5557ebc60f0b0fa54bfd19c00c467cfa543638de201938f3aa46e0549a1fb15137868b59e446f21e1f3d2f1c53fe01c3380e051770bc40d57c1aef93da2fdf072c135f78213f736ac4a6a474f91820d213d787b1203dc00a2bfdc45d7e6142706f77f53e11e25755d9bf090789d0f043ab89ba4d279105b3c1612b13e846a312cf4d8def6f90cec4ac7f9843ff878cce8b57d1f09c16278dcfb3d851fd426963f729eb9ed99c195404d4078881628d7d8939ed0a3ae322ff9fc1acf1342291c3ba6ad62e503b106d8939a66165c099edbbb59f2db5889c96797e0b6fe42cf4c5118a5", 0x121, 0x8}, {0x0}], 0x81, &(0x7f0000000000)) 17:11:20 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:20 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r2, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:20 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)) [ 1170.154408][T13058] loop1: detected capacity change from 0 to 4 [ 1170.189662][T13058] EXT4-fs (loop1): bad geometry: block count 54 exceeds size of device (2 blocks) 17:11:20 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:20 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:20 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)) 17:11:20 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:20 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r2, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:20 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:20 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:20 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:20 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) [ 1170.391067][T13083] loop1: detected capacity change from 0 to 256 17:11:20 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r2, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:20 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, 0x0, 0x0) [ 1170.444973][T13083] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 17:11:20 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:20 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:20 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:20 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) [ 1170.520742][T13083] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1170.544462][T13083] EXT4-fs (loop1): get root inode failed [ 1170.551281][T13083] EXT4-fs (loop1): mount failed 17:11:20 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:20 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:20 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, 0x0, 0x0) 17:11:20 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:20 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:20 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:20 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, 0x0, 0x0) 17:11:20 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) [ 1170.724723][T13119] loop1: detected capacity change from 0 to 256 17:11:20 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1170.777865][T13119] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 17:11:20 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 17:11:20 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1170.839142][T13119] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated 17:11:20 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) [ 1170.894036][T13119] EXT4-fs (loop1): get root inode failed [ 1170.932373][T13119] EXT4-fs (loop1): mount failed 17:11:20 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:20 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:20 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31, 0x0]}}]}) 17:11:20 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 17:11:20 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1170.953252][T13141] validate_nla: 31 callbacks suppressed [ 1170.953266][T13141] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:11:20 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:20 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:20 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31, 0x0]}}]}) 17:11:20 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x30}}, 0x0) 17:11:20 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000001810", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1171.095096][T13155] loop1: detected capacity change from 0 to 256 [ 1171.115316][T13160] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:11:21 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31, 0x0]}}]}) [ 1171.165996][T13155] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 1171.189088][T13160] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:11:21 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r2, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1171.240279][T13155] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1171.291779][T13155] EXT4-fs (loop1): get root inode failed [ 1171.300003][T13155] EXT4-fs (loop1): mount failed [ 1171.318406][T13176] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1171.329549][T13176] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:11:21 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:21 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:21 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x30}}, 0x0) 17:11:21 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000001810", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:21 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x70]}}]}) 17:11:21 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r2, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1171.430518][T13188] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1171.456536][T13193] loop1: detected capacity change from 0 to 256 17:11:21 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) [ 1171.476546][T13188] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:11:21 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x70]}}]}) 17:11:21 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000001810", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:21 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x30}}, 0x0) [ 1171.510839][T13193] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 17:11:21 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x70]}}]}) 17:11:21 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r2, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1171.614084][T13193] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1171.635236][T13193] EXT4-fs (loop1): get root inode failed [ 1171.641365][T13193] EXT4-fs (loop1): mount failed 17:11:21 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:21 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:21 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[], 0x30}}, 0x0) 17:11:21 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:21 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x0, 0x70]}}]}) [ 1171.676192][T13210] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1171.709664][T13210] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:11:21 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r2, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:21 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:21 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[], 0x30}}, 0x0) [ 1171.791374][T13222] loop1: detected capacity change from 0 to 256 17:11:21 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x0, 0x70]}}]}) [ 1171.833771][T13222] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 1171.853162][T13230] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:11:21 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:21 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) [ 1171.875632][T13222] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated 17:11:21 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:21 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[], 0x30}}, 0x0) [ 1171.918969][T13222] EXT4-fs (loop1): get root inode failed [ 1171.924714][T13222] EXT4-fs (loop1): mount failed 17:11:21 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:21 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r2, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:21 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:21 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x0, 0x70]}}]}) 17:11:21 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], 0x0, 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:21 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r2, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:21 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB], 0x30}}, 0x0) [ 1172.083051][T13255] loop1: detected capacity change from 0 to 256 17:11:22 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:22 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x31, 0x70]}}]}) 17:11:22 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], 0x0, 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1172.150166][T13255] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 17:11:22 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB], 0x30}}, 0x0) 17:11:22 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x31, 0x70]}}]}) [ 1172.211705][T13255] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1172.231267][T13255] EXT4-fs (loop1): get root inode failed [ 1172.240628][T13255] EXT4-fs (loop1): mount failed 17:11:22 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380), 0x0, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:22 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:22 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB], 0x30}}, 0x0) 17:11:22 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], 0x0, 0x2, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:22 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:22 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x31, 0x70]}}]}) 17:11:22 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1172.393599][T13288] loop1: detected capacity change from 0 to 256 17:11:22 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc01000000000200800004000000"], 0x30}}, 0x0) 17:11:22 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 17:11:22 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) [ 1172.444522][T13288] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 17:11:22 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x0, 0x31, 0x70]}}]}) 17:11:22 executing program 2: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1172.522891][T13288] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1172.558375][T13304] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1172.582629][T13288] EXT4-fs (loop1): get root inode failed [ 1172.590935][T13288] EXT4-fs (loop1): mount failed 17:11:22 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380), 0x0, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:22 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r2, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:22 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc01000000000200800004000000"], 0x30}}, 0x0) 17:11:22 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 17:11:22 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x0, 0x31, 0x70]}}]}) 17:11:22 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) [ 1172.718195][T13319] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1172.719963][T13320] loop1: detected capacity change from 0 to 256 17:11:22 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r2, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:22 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc01000000000200800004000000"], 0x30}}, 0x0) 17:11:22 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x0, 0x31, 0x70]}}]}) 17:11:22 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x1000, &(0x7f0000000280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 1172.761324][T13320] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 17:11:22 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) [ 1172.834724][T13320] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1172.855655][T13320] EXT4-fs (loop1): get root inode failed [ 1172.861488][T13320] EXT4-fs (loop1): mount failed [ 1172.874763][T13335] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 17:11:22 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:22 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380), 0x0, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:22 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:22 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r2, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:22 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x34, 0x31, 0x70]}}]}) 17:11:22 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc"], 0x30}}, 0x0) 17:11:22 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:22 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:22 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x34, 0x31, 0x70]}}]}) [ 1173.046690][T13355] loop1: detected capacity change from 0 to 256 17:11:22 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r2, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:23 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc01000000000200800004000000"], 0x30}}, 0x0) [ 1173.095806][T13355] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 17:11:23 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x34, 0x31, 0x70]}}]}) 17:11:23 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), 0x0, 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) [ 1173.154257][T13355] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1173.199481][T13372] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1173.230576][T13355] EXT4-fs (loop1): get root inode failed [ 1173.254632][T13355] EXT4-fs (loop1): mount failed 17:11:23 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="03000005000000000065352d0eaf1630838f21329e1844622eac64513781243f2336d2455070fc692a1ac6c4653a459e428e49a7101a194e284bab7636b7b5557ebc60f0b0fa54bfd19c00c467cfa543638de201938f3aa46e0549a1fb15137868b59e446f21e1f3d2f1c53fe01c3380e051770bc40d57c1aef93da2fdf072c135f78213f736ac4a6a474f91820d213d78", 0x91, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:23 executing program 3: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0x1}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x3, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYRES32=r0, @ANYBLOB="000000000000000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000009500000000dafb000000"], &(0x7f0000000080)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:11:23 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc01000000000200800004000000"], 0x30}}, 0x0) 17:11:23 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x0, 0x34, 0x31, 0x70]}}]}) 17:11:23 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r2, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:23 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:23 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r2, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:23 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1173.425014][T13389] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1173.436401][T13394] loop1: detected capacity change from 0 to 256 [ 1173.451192][T13394] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 17:11:23 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:23 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc01000000000200800004000000"], 0x30}}, 0x0) 17:11:23 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x0, 0x34, 0x31, 0x70]}}]}) [ 1173.522100][T13394] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1173.538308][T13394] EXT4-fs (loop1): get root inode failed [ 1173.544426][T13394] EXT4-fs (loop1): mount failed 17:11:23 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="03000005000000000065352d0eaf1630838f21329e1844622eac64513781243f2336d2455070fc692a1ac6c4653a459e428e49a7101a194e284bab7636b7b5557ebc60f0b0fa54bfd19c00c467cfa543638de201938f3aa46e0549a1fb15137868b59e446f21e1f3d2f1c53fe01c3380e051770bc40d57c1aef93da2fdf072c135f78213f736ac4a6a474f91820d213d78", 0x91, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:23 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x0, 0x34, 0x31, 0x70]}}]}) 17:11:23 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)={0x180, r2, 0x20, 0x70bd29, 0x25dfdbfc, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x168, 0x2, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}]}]}, 0x180}, 0x1, 0x0, 0x0, 0x48041}, 0x40000) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:23 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34, 0x31]}}]}) 17:11:23 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1173.652309][T13412] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1173.692235][T13413] loop1: detected capacity change from 0 to 256 17:11:23 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f1400"], 0x30}}, 0x0) 17:11:23 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1173.729098][T13413] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 1173.765063][T13413] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated 17:11:23 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, 0x0) 17:11:23 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)={0x180, r2, 0x20, 0x70bd29, 0x25dfdbfc, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x168, 0x2, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}]}]}, 0x180}, 0x1, 0x0, 0x0, 0x48041}, 0x40000) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:23 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x39, 0x34, 0x31, 0x70]}}]}) [ 1173.813466][T13413] EXT4-fs (loop1): get root inode failed [ 1173.822704][T13413] EXT4-fs (loop1): mount failed 17:11:23 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc01000000000200800004000000"], 0x30}}, 0x0) 17:11:23 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="03000005000000000065352d0eaf1630838f21329e1844622eac64513781243f2336d2455070fc692a1ac6c4653a459e428e49a7101a194e284bab7636b7b5557ebc60f0b0fa54bfd19c00c467cfa543638de201938f3aa46e0549a1fb15137868b59e446f21e1f3d2f1c53fe01c3380e051770bc40d57c1aef93da2fdf072c135f78213f736ac4a6a474f91820d213d78", 0x91, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:23 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:23 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, 0x0) 17:11:23 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc01000000000200800004000000"], 0x30}}, 0x0) [ 1173.944110][T13441] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1173.967178][T13442] loop1: detected capacity change from 0 to 256 17:11:23 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)={0x180, r2, 0x20, 0x70bd29, 0x25dfdbfc, {}, [@ETHTOOL_A_STRSET_COUNTS_ONLY={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0x168, 0x2, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}]}]}, 0x180}, 0x1, 0x0, 0x0, 0x48041}, 0x40000) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:23 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, 0x0) 17:11:23 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x39, 0x34, 0x31, 0x70]}}]}) [ 1174.059409][T13442] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 1174.061088][T13452] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 17:11:23 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:24 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:24 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x39, 0x34, 0x31, 0x70]}}]}) [ 1174.114113][T13442] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated 17:11:24 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:24 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc01000000000200800004000000"], 0x30}}, 0x0) [ 1174.222062][T13442] EXT4-fs (loop1): get root inode failed [ 1174.245303][T13469] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1174.268678][T13442] EXT4-fs (loop1): mount failed 17:11:24 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="03000005000000000065352d0eaf1630838f21329e1844622eac64513781243f2336d2455070fc692a1ac6c4653a459e428e49a7101a194e284bab7636b7b5557ebc60f0b0fa54bfd19c00c467cfa543638de201938f3aa46e0549a1fb15137868b59e446f21e1f3d2f1c53fe01c3380e051770bc40d57c1aef93da2fdf072c135f78213f736ac4a6a474f91820d213d787b1203dc00a2bfdc45d7e6142706f77f53e11e25755d9bf090789d0f043ab89ba4d279105b3c1612b13e846a312cf4d8def6f90cec4ac7f9843ff878cce8b57d1f09c16278dcfb3d", 0xd9, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:24 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:24 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x0, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:24 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e1"], 0x30}}, 0x0) 17:11:24 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)) 17:11:24 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:24 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)) [ 1174.413735][T13488] loop1: detected capacity change from 0 to 256 17:11:24 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16, @ANYBLOB="0d030000000000000000010000641db33a044a8c3a955b8e9bc431383cb081"], 0x38}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:24 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc01000000000200800004000000"], 0x30}}, 0x0) 17:11:24 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:24 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x0, 0x39, 0x34, 0x31, 0x70]}}]}) [ 1174.455098][T13488] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 1174.493431][T13488] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated 17:11:24 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)) [ 1174.522844][T13488] EXT4-fs (loop1): get root inode failed [ 1174.533094][T13488] EXT4-fs (loop1): mount failed [ 1174.549684][T13500] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 17:11:24 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="03000005000000000065352d0eaf1630838f21329e1844622eac64513781243f2336d2455070fc692a1ac6c4653a459e428e49a7101a194e284bab7636b7b5557ebc60f0b0fa54bfd19c00c467cfa543638de201938f3aa46e0549a1fb15137868b59e446f21e1f3d2f1c53fe01c3380e051770bc40d57c1aef93da2fdf072c135f78213f736ac4a6a474f91820d213d787b1203dc00a2bfdc45d7e6142706f77f53e11e25755d9bf090789d0f043ab89ba4d279105b3c1612b13e846a312cf4d8def6f90cec4ac7f9843ff878cce8b57d1f09c16278dcfb3d", 0xd9, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:24 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:24 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x0, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:24 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:24 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc01000000000200800004000000"], 0x30}}, 0x0) 17:11:24 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39, 0x34]}}]}) [ 1174.657432][T13513] loop1: detected capacity change from 0 to 256 17:11:24 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:24 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:24 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc01000000000200800004"], 0x30}}, 0x0) [ 1174.704567][T13513] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 17:11:24 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x37, 0x39, 0x34, 0x31, 0x70]}}]}) [ 1174.766604][T13513] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated 17:11:24 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37, 0x39]}}]}) 17:11:24 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) [ 1174.808090][T13513] EXT4-fs (loop1): get root inode failed [ 1174.814035][T13513] EXT4-fs (loop1): mount failed 17:11:24 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="03000005000000000065352d0eaf1630838f21329e1844622eac64513781243f2336d2455070fc692a1ac6c4653a459e428e49a7101a194e284bab7636b7b5557ebc60f0b0fa54bfd19c00c467cfa543638de201938f3aa46e0549a1fb15137868b59e446f21e1f3d2f1c53fe01c3380e051770bc40d57c1aef93da2fdf072c135f78213f736ac4a6a474f91820d213d787b1203dc00a2bfdc45d7e6142706f77f53e11e25755d9bf090789d0f043ab89ba4d279105b3c1612b13e846a312cf4d8def6f90cec4ac7f9843ff878cce8b57d1f09c16278dcfb3d", 0xd9, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:24 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:24 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34, 0x37]}}]}) 17:11:24 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc01000000000200800004"], 0x30}}, 0x0) 17:11:24 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:24 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:24 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc01000000000200"], 0x30}}, 0x0) 17:11:24 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) [ 1174.972788][T13547] loop1: detected capacity change from 0 to 256 17:11:24 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:24 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={0x0, 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1175.029959][T13547] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 17:11:24 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:24 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc01000000"], 0x30}}, 0x0) [ 1175.072400][T13547] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1175.152849][T13547] EXT4-fs (loop1): get root inode failed [ 1175.186723][T13547] EXT4-fs (loop1): mount failed 17:11:25 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="03000005000000000065352d0eaf1630838f21329e1844622eac64513781243f2336d2455070fc692a1ac6c4653a459e428e49a7101a194e284bab7636b7b5557ebc60f0b0fa54bfd19c00c467cfa543638de201938f3aa46e0549a1fb15137868b59e446f21e1f3d2f1c53fe01c3380e051770bc40d57c1aef93da2fdf072c135f78213f736ac4a6a474f91820d213d787b1203dc00a2bfdc45d7e6142706f77f53e11e25755d9bf090789d0f043ab89ba4d279105b3c1612b13e846a312cf4d8def6f90cec4ac7f9843ff878cce8b57d1f09c16278dcfb3d851fd426963f729eb9ed99c195404d4078881628d7d8939ed0a3ae322ff9fc1acf134229", 0xfd, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:25 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:25 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={0x0, 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:25 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks}]}) 17:11:25 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:25 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc01000000"], 0x30}}, 0x0) 17:11:25 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={0x0, 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:25 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc01000000"], 0x30}}, 0x0) 17:11:25 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) [ 1175.344256][T13588] tmpfs: Bad value for 'nr_blocks' [ 1175.355427][T13590] loop1: detected capacity change from 0 to 256 [ 1175.383755][T13592] tmpfs: Bad value for 'nr_blocks' 17:11:25 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:25 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks}]}) [ 1175.437939][T13590] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 1175.483875][T13590] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1175.509875][T13590] EXT4-fs (loop1): get root inode failed [ 1175.515743][T13590] EXT4-fs (loop1): mount failed 17:11:25 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) [ 1175.532096][T13607] tmpfs: Bad value for 'nr_blocks' [ 1175.541005][T13606] tmpfs: Bad value for 'nr_blocks' 17:11:25 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0xfd, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:25 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:25 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002"], 0x30}}, 0x0) 17:11:25 executing program 4: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x37, 0x39, 0x34, 0x31, 0x70]}}]}) 17:11:25 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks}]}) 17:11:25 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:25 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000"], 0x30}}, 0x0) 17:11:25 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:25 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000"], 0x30}}, 0x0) 17:11:25 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1175.713740][T13622] tmpfs: Bad value for 'nr_blocks' [ 1175.723622][T13626] loop1: detected capacity change from 0 to 256 [ 1175.751168][T13627] tmpfs: Bad value for 'nr_blocks' 17:11:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:25 executing program 3: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) [ 1175.776033][T13626] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 1175.860412][T13626] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1175.888737][T13626] EXT4-fs (loop1): get root inode failed [ 1175.898803][T13626] EXT4-fs (loop1): mount failed 17:11:25 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0xfd, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:25 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x0]}}]}) 17:11:25 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000"], 0x30}}, 0x0) 17:11:25 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:25 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000", @ANYRES16], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1175.983640][T13655] loop1: detected capacity change from 0 to 256 [ 1176.012875][T13656] validate_nla: 52 callbacks suppressed [ 1176.012890][T13656] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1176.018986][T13661] tmpfs: Bad value for 'nr_blocks' 17:11:25 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@assoc={0x18, 0x117, 0x4, 0xd4e5}], 0x18}, 0x0) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x9, 0x8, 0x4}, 0x40) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) io_setup(0x7, &(0x7f0000000000)=0x0) io_submit(r5, 0x2, &(0x7f0000000580)=[&(0x7f0000001680)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000140)='\x00', 0x1}, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, &(0x7f0000000180)}]) r6 = syz_open_dev$vivid(&(0x7f0000000240), 0x3, 0x2) io_submit(r5, 0x2, &(0x7f0000000640)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x3, 0x77, r6, &(0x7f0000000280)="0399e441970b0bad916de0d85c3189a4b1e46888cc8c0be1a5e6b92af65e2b3a08b45f05898ab7", 0x27, 0x9a3, 0x0, 0x3}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x7, 0x1, r3, &(0x7f0000000340)="17735b0fb2833446fc45be3af8e560d1", 0x10, 0xac}]) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r2, &(0x7f0000000740)="d29ff5bb1e397d0c55584a4ecc5b8ceb33048e583dd863c8aec32be628f044a7f9312c29a3a8af3385df96f81ee7ee1e394e61dbd13c94e4d2f2a843fa057a890e", &(0x7f0000000000)=@udp=r3}, 0x20) bind$inet(r3, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000680)={r2, &(0x7f0000000340), &(0x7f0000000440)=@udp=r3}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000100)={r2, &(0x7f0000000380)='Z', &(0x7f0000000200)=@udp}, 0x20) splice(r0, &(0x7f0000000140)=0x5a, r2, &(0x7f00000001c0), 0x9, 0x2) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000008c0)=[{{&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000d80)=""/206, 0x280}, {&(0x7f0000000b00)=""/24, 0x9}, {&(0x7f0000000c00)=""/229, 0xd414}, {&(0x7f0000000400)=""/41, 0x29}, {&(0x7f0000000440)=""/110, 0xfffffec2}, {&(0x7f00000004c0)=""/197, 0x1f}], 0x6, &(0x7f00000006c0)=""/118, 0x7b, 0x200000f}}, {{&(0x7f0000000b80)=@ipx, 0x80, &(0x7f0000000840), 0x0, &(0x7f0000000880)=""/24, 0x18}}], 0x2, 0x0, &(0x7f0000000b40)={0x0, 0x989680}) [ 1176.030905][T13655] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 1176.047806][T13656] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1176.060582][T13655] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated 17:11:25 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000"], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:26 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x0]}}]}) 17:11:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1176.090055][T13655] EXT4-fs (loop1): get root inode failed [ 1176.105645][T13655] EXT4-fs (loop1): mount failed [ 1176.129541][T13672] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:11:26 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x10f, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:26 executing program 3: socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@assoc={0x18, 0x117, 0x4, 0xd4e5}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000008c0)=[{{&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000d80)=""/206, 0xce}, {&(0x7f0000000b00)=""/24, 0x18}, {&(0x7f00000001c0)=""/229, 0xe5}, {&(0x7f0000000140)=""/47, 0x2f}, {&(0x7f0000000440)=""/110, 0x6e}, {&(0x7f00000004c0)=""/197, 0xc5}], 0x6, &(0x7f0000000300)=""/120, 0x78, 0x200000f}}, {{&(0x7f0000000b80)=@ipx, 0x80, &(0x7f0000000400)=[{&(0x7f0000000380)=""/75, 0x4b}, {&(0x7f0000000e80)=""/4096, 0x1000}], 0x2, &(0x7f0000000880)=""/24, 0x18}, 0x86e0}], 0x2, 0x0, &(0x7f0000000640)={0x77359400}) [ 1176.180859][T13672] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1176.216841][T13680] tmpfs: Bad value for 'nr_blocks' 17:11:26 executing program 4: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:26 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:26 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:26 executing program 0: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x0]}}]}) 17:11:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@assoc={0x18, 0x117, 0x4, 0xd4e5}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000008c0)=[{{&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000d80)=""/206, 0xce}, {&(0x7f0000000b00)=""/24, 0x18}, {&(0x7f00000001c0)=""/229, 0xe5}, {&(0x7f0000000140)=""/47, 0x2f}, {&(0x7f0000000440)=""/110, 0x6e}, {&(0x7f00000004c0)=""/197, 0xc5}], 0x6, &(0x7f0000000300)=""/120, 0x78, 0x200000f}}, {{&(0x7f0000000b80)=@ipx, 0x80, &(0x7f0000000400)=[{&(0x7f0000000380)=""/75, 0x4b}, {&(0x7f0000000e80)=""/4096, 0x1000}], 0x2, &(0x7f0000000880)=""/24, 0x18}, 0x86e0}], 0x2, 0x0, &(0x7f0000000640)={0x77359400}) [ 1176.230232][T13683] loop1: detected capacity change from 0 to 256 [ 1176.252084][T13683] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 17:11:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@assoc={0x18, 0x117, 0x4, 0xd4e5}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000008c0)=[{{&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000d80)=""/206, 0xce}, {&(0x7f0000000b00)=""/24, 0x18}, {&(0x7f00000001c0)=""/229, 0xe5}, {&(0x7f0000000140)=""/47, 0x2f}, {&(0x7f0000000440)=""/110, 0x6e}, {&(0x7f00000004c0)=""/197, 0xc5}], 0x6, &(0x7f0000000300)=""/120, 0x78, 0x200000f}}, {{&(0x7f0000000b80)=@ipx, 0x80, &(0x7f0000000400)=[{&(0x7f0000000380)=""/75, 0x4b}, {&(0x7f0000000e80)=""/4096, 0x1000}], 0x2, &(0x7f0000000880)=""/24, 0x18}, 0x86e0}], 0x2, 0x0, &(0x7f0000000640)={0x77359400}) 17:11:26 executing program 4: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1176.329461][T13683] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1176.334077][T13693] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1176.359825][T13699] tmpfs: Bad value for 'nr_blocks' 17:11:26 executing program 0: socket$alg(0x26, 0x5, 0x0) syz_io_uring_complete(0x0) pipe(&(0x7f0000000000)) pipe(&(0x7f0000000e80)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000380)=[{&(0x7f0000000ec0)="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", 0x1000}, {&(0x7f0000001ec0)='h', 0x1}], 0x2, 0x0) close(r0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000034000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000140)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8dd0f0f6300bfc7442402c43a727fc7442406000000000f011424f30f090f013a360f0666b8c0008ec066baa100ed", 0x4e}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, &(0x7f00000000c0)={0x0, 0x99}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000001c0)={[0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000003c0)=""/137, &(0x7f0000000100)=0x89) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000035000/0x1000)=nil}) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000000000000a000000ffff000000000000000000000000000000000005000000000000f800"/56]) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='ns\x00') 17:11:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@assoc={0x18, 0x117, 0x4, 0xd4e5}], 0x18}, 0x0) accept4$alg(r0, 0x0, 0x0, 0x80800) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f00000008c0)=[{{&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000d80)=""/206, 0x280}, {&(0x7f0000000b00)=""/24, 0x9}, {&(0x7f0000000c00)=""/229, 0xd414}, {&(0x7f0000000400)=""/41, 0x29}, {&(0x7f0000000440)=""/110, 0xfffffec2}, {&(0x7f00000004c0)=""/197, 0x1f}], 0x6, &(0x7f00000006c0)=""/118, 0x7b, 0x200000f}}, {{&(0x7f0000000b80)=@ipx, 0x80, &(0x7f0000000840), 0x0, &(0x7f0000000880)=""/24, 0x18}}], 0x2, 0x0, &(0x7f0000000b40)={0x0, 0x989680}) [ 1176.379958][T13683] EXT4-fs (loop1): get root inode failed [ 1176.391599][T13683] EXT4-fs (loop1): mount failed [ 1176.408200][T13693] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:11:26 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x10f, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:26 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:26 executing program 4: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1176.500578][T13706] KVM: KVM_SET_CPUID{,2} after KVM_RUN may cause guest instability [ 1176.511416][T13706] KVM: KVM_SET_CPUID{,2} will fail after KVM_RUN starting with Linux 5.16 17:11:26 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:26 executing program 5: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000100)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r0, &(0x7f0000000140), &(0x7f0000000180)=""/183, 0x4}, 0x20) 17:11:26 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x9, 0x8, 0x4}, 0x40) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r3, &(0x7f0000000100), &(0x7f0000000000)=@udp=r4}, 0x20) r5 = getpgid(0x0) statx(r2, &(0x7f0000000140)='./file0\x00', 0x400, 0x800, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000380)={r5, r6}, 0xc) [ 1176.547686][T13720] loop1: detected capacity change from 0 to 256 [ 1176.584792][T13720] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 17:11:26 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:26 executing program 5: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x2000}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x9, 0x8, 0x4}, 0x40) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x8) geteuid() bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000140)="53cd4029e19bdc", &(0x7f0000000180)=""/124}, 0x20) 17:11:26 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:26 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1176.622492][T13728] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1176.627073][T13720] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 1176.653695][T13720] EXT4-fs (loop1): get root inode failed [ 1176.662049][T13720] EXT4-fs (loop1): mount failed 17:11:26 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x10f, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:26 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:26 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:26 executing program 5: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x3f, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) request_key(&(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)='/dev/ttyS3\x00', 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840), 0x802, 0x0) setxattr$trusted_overlay_upper(0x0, &(0x7f0000000180), &(0x7f0000000200)={0x0, 0xfb, 0x2c, 0x0, 0x4, "7331738eb1ba71aa6c92b9ba4071214c", "20f048671a6f8ffc05a00a0854142a1c9818cf234d2ddf"}, 0x2c, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x6b) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_int(r2, &(0x7f00000001c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) dup3(r3, r2, 0x0) writev(r2, &(0x7f0000000300)=[{&(0x7f00000000c0)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x9, 0x8, 0x4}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000100)={r4, &(0x7f0000000380), 0x0}, 0x20) bpf$MAP_DELETE_ELEM(0x4, &(0x7f0000000040)={r0, &(0x7f0000000100)}, 0x20) 17:11:26 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x9, 0x8, 0x4}, 0x40) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r3, &(0x7f0000000100), &(0x7f0000000000)=@udp=r4}, 0x20) r5 = getpgid(0x0) statx(r2, &(0x7f0000000140)='./file0\x00', 0x400, 0x800, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000380)={r5, r6}, 0xc) [ 1176.751923][T13746] loop1: detected capacity change from 0 to 256 [ 1176.761609][T13744] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1176.765218][T13746] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 17:11:26 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:26 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1176.830276][T13746] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated 17:11:26 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) [ 1176.897295][ T3238] ieee802154 phy0 wpan0: encryption failed: -22 [ 1176.903605][ T3238] ieee802154 phy1 wpan1: encryption failed: -22 [ 1176.924198][T13763] new mount options do not match the existing superblock, will be ignored [ 1176.944825][T13746] EXT4-fs (loop1): get root inode failed 17:11:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) [ 1177.005499][T13746] EXT4-fs (loop1): mount failed 17:11:26 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x9, 0x8, 0x4}, 0x40) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r3, &(0x7f0000000100), &(0x7f0000000000)=@udp=r4}, 0x20) r5 = getpgid(0x0) statx(r2, &(0x7f0000000140)='./file0\x00', 0x400, 0x800, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000380)={r5, r6}, 0xc) 17:11:26 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 17:11:26 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) [ 1177.026877][T13770] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:11:26 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x118, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:26 executing program 5 (fault-call:4 fault-nth:0): syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:26 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r2, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:26 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x9, 0x8, 0x4}, 0x40) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r3, &(0x7f0000000100), &(0x7f0000000000)=@udp=r4}, 0x20) getpgid(0x0) statx(r2, &(0x7f0000000140)='./file0\x00', 0x400, 0x800, &(0x7f0000000280)) 17:11:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) 17:11:27 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:27 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) pipe(&(0x7f00000001c0)) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x9, 0x8, 0x4}, 0x40) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r2, &(0x7f0000000100), &(0x7f0000000000)=@udp=r3}, 0x20) getpgid(0x0) [ 1177.142291][T13786] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1177.160168][T13787] FAULT_INJECTION: forcing a failure. [ 1177.160168][T13787] name failslab, interval 1, probability 0, space 0, times 0 [ 1177.169091][T13792] loop1: detected capacity change from 0 to 256 [ 1177.218849][T13792] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 1177.234482][T13787] CPU: 0 PID: 13787 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 1177.242922][T13787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1177.252981][T13787] Call Trace: [ 1177.256262][T13787] dump_stack_lvl+0x1d3/0x29f [ 1177.259254][T13792] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 1177.260947][T13787] ? show_regs_print_info+0x12/0x12 [ 1177.260972][T13787] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 1177.278260][T13787] ? __might_sleep+0x100/0x100 [ 1177.283033][T13787] ? __fget_files+0x35a/0x390 [ 1177.284800][T13792] EXT4-fs (loop1): mount failed [ 1177.287894][T13787] should_fail+0x384/0x4b0 [ 1177.287921][T13787] ? getname_flags+0xba/0x650 [ 1177.287939][T13787] should_failslab+0x5/0x20 [ 1177.287953][T13787] kmem_cache_alloc+0x6b/0x340 [ 1177.287968][T13787] ? vtime_user_exit+0x2b2/0x3e0 [ 1177.287988][T13787] getname_flags+0xba/0x650 [ 1177.288005][T13787] __x64_sys_mkdir+0x5b/0x80 [ 1177.288023][T13787] do_syscall_64+0x3d/0xb0 [ 1177.288043][T13787] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1177.288060][T13787] RIP: 0033:0x465707 [ 1177.339238][T13787] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1177.358856][T13787] RSP: 002b:00007f320bda2fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 17:11:27 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) pipe(&(0x7f00000001c0)) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x9, 0x8, 0x4}, 0x40) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r2, &(0x7f0000000100), &(0x7f0000000000)=@udp=r3}, 0x20) 17:11:27 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r2, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1177.367273][T13787] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000465707 [ 1177.375249][T13787] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 1177.383213][T13787] RBP: 00007f320bda3040 R08: 0000000000000000 R09: 0000000000002020 [ 1177.391189][T13787] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000180 [ 1177.399163][T13787] R13: 00000000200001c0 R14: 00007f320bda3000 R15: 0000000020000100 17:11:27 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x118, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:27 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) 17:11:27 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) pipe(&(0x7f00000001c0)) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x9, 0x8, 0x4}, 0x40) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) [ 1177.540947][T13817] loop1: detected capacity change from 0 to 256 [ 1177.574600][T13817] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 1177.652467][T13817] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 1177.665804][T13817] EXT4-fs (loop1): mount failed 17:11:27 executing program 5 (fault-call:4 fault-nth:1): syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:27 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r2, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:27 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) 17:11:27 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) pipe(&(0x7f00000001c0)) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x9, 0x8, 0x4}, 0x40) socket$inet_udp(0x2, 0x2, 0x0) 17:11:27 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x118, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) 17:11:27 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) pipe(&(0x7f00000001c0)) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x9, 0x8, 0x4}, 0x40) 17:11:27 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:27 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) [ 1177.844204][T13838] loop1: detected capacity change from 0 to 256 [ 1177.854657][T13840] FAULT_INJECTION: forcing a failure. [ 1177.854657][T13840] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1177.873744][T13838] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 1177.891975][T13840] CPU: 1 PID: 13840 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 1177.900425][T13840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1177.910485][T13840] Call Trace: [ 1177.913765][T13840] dump_stack_lvl+0x1d3/0x29f [ 1177.918453][T13840] ? show_regs_print_info+0x12/0x12 [ 1177.923660][T13840] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 1177.929396][T13840] ? __lock_acquire+0x6100/0x6100 [ 1177.934429][T13840] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1177.940069][T13840] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1177.946069][T13840] should_fail+0x384/0x4b0 [ 1177.950675][T13840] strncpy_from_user+0x32/0x350 [ 1177.955542][T13840] getname_flags+0xf0/0x650 [ 1177.960059][T13840] __x64_sys_mkdir+0x5b/0x80 [ 1177.964667][T13840] do_syscall_64+0x3d/0xb0 [ 1177.969092][T13840] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1177.974996][T13840] RIP: 0033:0x465707 [ 1177.978893][T13840] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1177.998499][T13840] RSP: 002b:00007f320bda2fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1178.006919][T13840] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000465707 [ 1178.014891][T13840] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200001c0 [ 1178.022848][T13840] RBP: 00007f320bda3040 R08: 0000000000000000 R09: 0000000000002020 [ 1178.030804][T13840] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000180 17:11:27 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={0x0}}, 0x0) [ 1178.038780][T13840] R13: 00000000200001c0 R14: 00007f320bda3000 R15: 0000000020000100 17:11:27 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) pipe(&(0x7f00000001c0)) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x9, 0x8, 0x4}, 0x40) [ 1178.114746][T13838] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 1178.154992][T13838] EXT4-fs (loop1): mount failed 17:11:28 executing program 5 (fault-call:4 fault-nth:2): syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:28 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:28 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:28 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) pipe(&(0x7f00000001c0)) 17:11:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={0x0}}, 0x0) 17:11:28 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x11d, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:28 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) [ 1178.344810][T13875] FAULT_INJECTION: forcing a failure. [ 1178.344810][T13875] name failslab, interval 1, probability 0, space 0, times 0 [ 1178.367228][T13875] CPU: 0 PID: 13875 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 1178.375663][T13875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1178.385723][T13875] Call Trace: [ 1178.388994][T13875] dump_stack_lvl+0x1d3/0x29f [ 1178.393662][T13875] ? show_regs_print_info+0x12/0x12 [ 1178.398840][T13875] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 1178.404542][T13875] ? __might_sleep+0x100/0x100 [ 1178.409287][T13875] ? trace_lock_release+0x4f/0x150 [ 1178.414379][T13875] should_fail+0x384/0x4b0 [ 1178.418780][T13875] ? __se_sys_mount+0x9a/0x3b0 [ 1178.423532][T13875] should_failslab+0x5/0x20 [ 1178.428015][T13875] __kmalloc_track_caller+0x8b/0x390 [ 1178.433283][T13875] ? trace_kmem_cache_free+0x2e/0xe0 [ 1178.438548][T13875] ? strnlen_user+0x1a7/0x260 [ 1178.443211][T13875] strndup_user+0x73/0x150 [ 1178.447610][T13875] __se_sys_mount+0x9a/0x3b0 [ 1178.452354][T13875] ? print_irqtrace_events+0x220/0x220 [ 1178.457796][T13875] ? vtime_user_exit+0x2b2/0x3e0 [ 1178.462716][T13875] ? __x64_sys_mount+0xc0/0xc0 [ 1178.467461][T13875] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1178.473421][T13875] ? __x64_sys_mount+0x1c/0xc0 [ 1178.478165][T13875] do_syscall_64+0x3d/0xb0 [ 1178.482564][T13875] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1178.488443][T13875] RIP: 0033:0x467b1a [ 1178.492329][T13875] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1178.511912][T13875] RSP: 002b:00007f320bda2fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1178.520322][T13875] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 1178.528283][T13875] RDX: 0000000020000180 RSI: 00000000200001c0 RDI: 0000000000000000 [ 1178.536245][T13875] RBP: 00007f320bda3040 R08: 00007f320bda3040 R09: 0000000020000180 17:11:28 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={0x0}}, 0x0) 17:11:28 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) [ 1178.544199][T13875] R10: 0000000000002020 R11: 0000000000000202 R12: 0000000020000180 [ 1178.552149][T13875] R13: 00000000200001c0 R14: 00007f320bda3000 R15: 0000000020000100 [ 1178.572160][T13876] loop1: detected capacity change from 0 to 256 17:11:28 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1178.601538][T13876] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 17:11:28 executing program 5 (fault-call:4 fault-nth:3): syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:28 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:28 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) [ 1178.679351][T13876] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: casefold flag without casefold feature 17:11:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:28 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:28 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x11d, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) [ 1178.793802][T13876] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 1178.801062][T13876] EXT4-fs (loop1): mount failed 17:11:28 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1178.851581][T13898] FAULT_INJECTION: forcing a failure. [ 1178.851581][T13898] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1178.893974][T13898] CPU: 1 PID: 13898 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 1178.902420][T13898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1178.912475][T13898] Call Trace: [ 1178.915769][T13898] dump_stack_lvl+0x1d3/0x29f [ 1178.920504][T13898] ? show_regs_print_info+0x12/0x12 [ 1178.925737][T13898] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 1178.931464][T13898] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1178.937102][T13898] ? lock_release+0x81/0x7b0 [ 1178.941698][T13898] ? trace_lock_release+0x4f/0x150 [ 1178.946819][T13898] should_fail+0x384/0x4b0 [ 1178.951247][T13898] _copy_from_user+0x2d/0x170 [ 1178.955930][T13898] strndup_user+0xb0/0x150 [ 1178.960435][T13898] __se_sys_mount+0x9a/0x3b0 [ 1178.965033][T13898] ? print_irqtrace_events+0x220/0x220 [ 1178.970501][T13898] ? vtime_user_exit+0x2b2/0x3e0 [ 1178.975445][T13898] ? __x64_sys_mount+0xc0/0xc0 [ 1178.980303][T13898] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1178.986290][T13898] ? __x64_sys_mount+0x1c/0xc0 [ 1178.991072][T13898] do_syscall_64+0x3d/0xb0 [ 1178.995498][T13898] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1179.001395][T13898] RIP: 0033:0x467b1a [ 1179.005289][T13898] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1179.024896][T13898] RSP: 002b:00007f320bda2fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1179.033315][T13898] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a 17:11:28 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:28 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:28 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:28 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r2, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r5, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1179.041290][T13898] RDX: 0000000020000180 RSI: 00000000200001c0 RDI: 0000000000000000 [ 1179.049265][T13898] RBP: 00007f320bda3040 R08: 00007f320bda3040 R09: 0000000020000180 [ 1179.057239][T13898] R10: 0000000000002020 R11: 0000000000000202 R12: 0000000020000180 [ 1179.065207][T13898] R13: 00000000200001c0 R14: 00007f320bda3000 R15: 0000000020000100 17:11:29 executing program 5 (fault-call:4 fault-nth:4): syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:29 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:29 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:29 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r2, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r5, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1179.130609][T13910] loop1: detected capacity change from 0 to 256 [ 1179.152314][T13910] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 17:11:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x44, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x44}}, 0x0) [ 1179.256205][T13910] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: casefold flag without casefold feature [ 1179.284243][T13910] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 1179.286499][T13938] FAULT_INJECTION: forcing a failure. [ 1179.286499][T13938] name failslab, interval 1, probability 0, space 0, times 0 [ 1179.290925][T13910] EXT4-fs (loop1): mount failed [ 1179.313934][T13938] CPU: 0 PID: 13938 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 1179.322443][T13938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1179.332500][T13938] Call Trace: [ 1179.335778][T13938] dump_stack_lvl+0x1d3/0x29f [ 1179.340467][T13938] ? show_regs_print_info+0x12/0x12 [ 1179.345667][T13938] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 1179.351392][T13938] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1179.357027][T13938] ? __might_sleep+0x100/0x100 [ 1179.361791][T13938] ? lock_release+0x81/0x7b0 [ 1179.366383][T13938] ? trace_lock_release+0x4f/0x150 [ 1179.371495][T13938] should_fail+0x384/0x4b0 [ 1179.375917][T13938] ? __se_sys_mount+0x15e/0x3b0 [ 1179.380768][T13938] should_failslab+0x5/0x20 [ 1179.385270][T13938] kmem_cache_alloc_trace+0x6a/0x340 [ 1179.390552][T13938] ? _copy_from_user+0x10c/0x170 [ 1179.395665][T13938] __se_sys_mount+0x15e/0x3b0 [ 1179.400339][T13938] ? print_irqtrace_events+0x220/0x220 [ 1179.405795][T13938] ? vtime_user_exit+0x2b2/0x3e0 [ 1179.410733][T13938] ? __x64_sys_mount+0xc0/0xc0 [ 1179.415498][T13938] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1179.421486][T13938] ? __x64_sys_mount+0x1c/0xc0 [ 1179.426255][T13938] do_syscall_64+0x3d/0xb0 [ 1179.430677][T13938] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1179.436571][T13938] RIP: 0033:0x467b1a [ 1179.440463][T13938] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1179.460069][T13938] RSP: 002b:00007f320bda2fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1179.468488][T13938] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 1179.476457][T13938] RDX: 0000000020000180 RSI: 00000000200001c0 RDI: 0000000000000000 [ 1179.484425][T13938] RBP: 00007f320bda3040 R08: 00007f320bda3040 R09: 0000000020000180 [ 1179.492397][T13938] R10: 0000000000002020 R11: 0000000000000202 R12: 0000000020000180 [ 1179.500368][T13938] R13: 00000000200001c0 R14: 00007f320bda3000 R15: 0000000020000100 17:11:29 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x11d, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:29 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:29 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:29 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r2, 0x0, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r5, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x44, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x44}}, 0x0) 17:11:29 executing program 5 (fault-call:4 fault-nth:5): syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:29 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) 17:11:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x44, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x44}}, 0x0) 17:11:29 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:29 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r5, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:29 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7ac22d8350b94"], 0x30}}, 0x0) [ 1179.656084][T13958] loop1: detected capacity change from 0 to 256 [ 1179.717403][T13963] FAULT_INJECTION: forcing a failure. [ 1179.717403][T13963] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1179.733288][T13958] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 1179.768786][T13958] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: casefold flag without casefold feature [ 1179.789834][T13963] CPU: 1 PID: 13963 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 1179.798451][T13963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1179.808509][T13963] Call Trace: [ 1179.811791][T13963] dump_stack_lvl+0x1d3/0x29f [ 1179.816498][T13963] ? show_regs_print_info+0x12/0x12 [ 1179.821703][T13963] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 1179.827522][T13963] ? lock_release+0x81/0x7b0 [ 1179.832114][T13963] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1179.837753][T13963] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1179.843865][T13963] should_fail+0x384/0x4b0 [ 1179.848291][T13963] _copy_from_user+0x2d/0x170 [ 1179.852972][T13963] __se_sys_mount+0x181/0x3b0 [ 1179.857640][T13963] ? vtime_user_exit+0x2b2/0x3e0 [ 1179.862562][T13963] ? __x64_sys_mount+0xc0/0xc0 [ 1179.867310][T13963] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1179.873279][T13963] ? __x64_sys_mount+0x1c/0xc0 [ 1179.878044][T13963] do_syscall_64+0x3d/0xb0 [ 1179.882470][T13963] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1179.885477][T13958] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 1179.888367][T13963] RIP: 0033:0x467b1a [ 1179.888386][T13963] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1179.888402][T13963] RSP: 002b:00007f320bda2fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1179.888420][T13963] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 1179.888431][T13963] RDX: 0000000020000180 RSI: 00000000200001c0 RDI: 0000000000000000 [ 1179.888443][T13963] RBP: 00007f320bda3040 R08: 00007f320bda3040 R09: 0000000020000180 [ 1179.888455][T13963] R10: 0000000000002020 R11: 0000000000000202 R12: 0000000020000180 [ 1179.903939][T13958] EXT4-fs (loop1): mount failed 17:11:29 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, 0x0, 0x0) [ 1179.918292][T13963] R13: 00000000200001c0 R14: 00007f320bda3000 R15: 0000000020000100 17:11:29 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x11f, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:29 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:29 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, 0x0, 0x0) 17:11:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x44, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x0) 17:11:29 executing program 5 (fault-call:4 fault-nth:6): syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:29 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r5, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:29 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, 0x0, 0x0) 17:11:29 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x44, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x0) 17:11:30 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:30 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r5, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1180.081396][T13992] loop1: detected capacity change from 0 to 256 [ 1180.095628][T13988] FAULT_INJECTION: forcing a failure. [ 1180.095628][T13988] name failslab, interval 1, probability 0, space 0, times 0 [ 1180.116057][T13992] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 17:11:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x44, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x0) [ 1180.153169][T13992] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: casefold flag without casefold feature [ 1180.162867][T13988] CPU: 1 PID: 13988 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 1180.174437][T13988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1180.184583][T13988] Call Trace: [ 1180.187865][T13988] dump_stack_lvl+0x1d3/0x29f [ 1180.192552][T13988] ? show_regs_print_info+0x12/0x12 [ 1180.197755][T13988] ? log_buf_vmcoreinfo_setup+0x498/0x498 17:11:30 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) [ 1180.203660][T13988] ? print_irqtrace_events+0x220/0x220 [ 1180.209214][T13988] ? do_user_addr_fault+0xcc6/0x10c0 [ 1180.214651][T13988] ? bad_area_nosemaphore+0x30/0x30 [ 1180.219857][T13988] should_fail+0x384/0x4b0 [ 1180.224283][T13988] ? getname_flags+0xba/0x650 [ 1180.227495][T13992] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 1180.228963][T13988] should_failslab+0x5/0x20 [ 1180.228988][T13988] kmem_cache_alloc+0x6b/0x340 [ 1180.229008][T13988] getname_flags+0xba/0x650 [ 1180.243215][T13992] EXT4-fs (loop1): mount failed [ 1180.244710][T13988] user_path_at_empty+0x2a/0x1b0 [ 1180.244740][T13988] __se_sys_mount+0x2be/0x3b0 [ 1180.263656][T13988] ? __x64_sys_mount+0xc0/0xc0 [ 1180.268427][T13988] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1180.274412][T13988] ? __x64_sys_mount+0x1c/0xc0 [ 1180.279182][T13988] do_syscall_64+0x3d/0xb0 [ 1180.283601][T13988] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1180.289498][T13988] RIP: 0033:0x467b1a [ 1180.293392][T13988] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1180.312995][T13988] RSP: 002b:00007f320bda2fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1180.321410][T13988] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 1180.329378][T13988] RDX: 0000000020000180 RSI: 00000000200001c0 RDI: 0000000000000000 [ 1180.337419][T13988] RBP: 00007f320bda3040 R08: 00007f320bda3040 R09: 0000000020000180 [ 1180.345368][T13988] R10: 0000000000002020 R11: 0000000000000202 R12: 0000000020000180 [ 1180.353316][T13988] R13: 00000000200001c0 R14: 00007f320bda3000 R15: 0000000020000100 17:11:30 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x11f, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:30 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:30 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 17:11:30 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x68}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r5, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:30 executing program 5 (fault-call:4 fault-nth:7): syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:30 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 17:11:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:30 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) [ 1180.486907][T14024] loop1: detected capacity change from 0 to 256 [ 1180.488902][T14023] FAULT_INJECTION: forcing a failure. [ 1180.488902][T14023] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1180.517955][T14024] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 17:11:30 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x30}}, 0x0) 17:11:30 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x68}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r5, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1180.538357][T14024] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: casefold flag without casefold feature [ 1180.566660][T14024] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 1180.573751][T14024] EXT4-fs (loop1): mount failed 17:11:30 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x68}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r5, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1180.603888][T14023] CPU: 0 PID: 14023 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 1180.612321][T14023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1180.622375][T14023] Call Trace: [ 1180.625653][T14023] dump_stack_lvl+0x1d3/0x29f [ 1180.630337][T14023] ? show_regs_print_info+0x12/0x12 [ 1180.635542][T14023] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 1180.641271][T14023] ? do_user_addr_fault+0xcc6/0x10c0 [ 1180.646563][T14023] ? print_irqtrace_events+0x220/0x220 [ 1180.652020][T14023] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1180.657657][T14023] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1180.663635][T14023] should_fail+0x384/0x4b0 [ 1180.668110][T14023] strncpy_from_user+0x32/0x350 [ 1180.672964][T14023] getname_flags+0xf0/0x650 [ 1180.677471][T14023] user_path_at_empty+0x2a/0x1b0 [ 1180.682412][T14023] __se_sys_mount+0x2be/0x3b0 [ 1180.687130][T14023] ? __x64_sys_mount+0xc0/0xc0 [ 1180.691898][T14023] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1180.697880][T14023] ? __x64_sys_mount+0x1c/0xc0 [ 1180.702646][T14023] do_syscall_64+0x3d/0xb0 [ 1180.707071][T14023] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1180.712970][T14023] RIP: 0033:0x467b1a [ 1180.716861][T14023] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1180.736468][T14023] RSP: 002b:00007f320bda2fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1180.744885][T14023] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 1180.752853][T14023] RDX: 0000000020000180 RSI: 00000000200001c0 RDI: 0000000000000000 [ 1180.760855][T14023] RBP: 00007f320bda3040 R08: 00007f320bda3040 R09: 0000000020000180 [ 1180.768811][T14023] R10: 0000000000002020 R11: 0000000000000202 R12: 0000000020000180 [ 1180.776780][T14023] R13: 00000000200001c0 R14: 00007f320bda3000 R15: 0000000020000100 17:11:30 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x11f, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:30 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:30 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x30}}, 0x0) 17:11:30 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000000)=@udp=r0}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:30 executing program 5 (fault-call:4 fault-nth:8): syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:30 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000000)=@udp=r0}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x40, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}}, 0x0) [ 1180.876270][T14057] loop1: detected capacity change from 0 to 256 [ 1180.885725][T14058] __nla_validate_parse: 5 callbacks suppressed [ 1180.885740][T14058] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.2'. 17:11:30 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x30}}, 0x0) [ 1180.922090][T14057] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 1180.946447][T14060] FAULT_INJECTION: forcing a failure. [ 1180.946447][T14060] name failslab, interval 1, probability 0, space 0, times 0 17:11:30 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1180.975394][T14060] CPU: 0 PID: 14060 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 1180.983850][T14060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1180.993922][T14060] Call Trace: [ 1180.997209][T14060] dump_stack_lvl+0x1d3/0x29f [ 1181.001907][T14060] ? show_regs_print_info+0x12/0x12 [ 1181.007124][T14060] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 1181.012858][T14060] ? lock_acquire+0xa4/0x4a0 [ 1181.017447][T14060] ? rcu_lock_acquire+0x5/0x30 17:11:30 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[], 0x30}}, 0x0) [ 1181.022214][T14060] ? __rcu_read_lock+0xb0/0xb0 [ 1181.026989][T14060] should_fail+0x384/0x4b0 [ 1181.031417][T14060] ? tomoyo_encode2+0x25a/0x560 [ 1181.036275][T14060] should_failslab+0x5/0x20 [ 1181.040782][T14060] __kmalloc+0x89/0x390 [ 1181.044944][T14060] ? is_bpf_text_address+0x253/0x270 [ 1181.050240][T14060] ? stack_trace_save+0x1e0/0x1e0 [ 1181.055272][T14060] tomoyo_encode2+0x25a/0x560 [ 1181.059952][T14060] tomoyo_mount_permission+0x2a8/0xae0 [ 1181.065429][T14060] ? stack_trace_save+0x104/0x1e0 [ 1181.070460][T14060] ? stack_trace_snprint+0xe0/0xe0 [ 1181.075575][T14060] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1181.081210][T14060] ? asan.module_dtor+0x20/0x20 [ 1181.086238][T14060] ? bpf_lsm_inode_permission+0x5/0x10 [ 1181.091795][T14060] ? kmem_cache_free+0x85/0x170 [ 1181.096650][T14060] ? user_path_at_empty+0x153/0x1b0 [ 1181.101857][T14060] ? __se_sys_mount+0x2be/0x3b0 [ 1181.106720][T14060] ? do_syscall_64+0x3d/0xb0 [ 1181.111317][T14060] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1181.115229][T14080] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1181.117390][T14060] ? do_raw_spin_lock+0x151/0x8e0 [ 1181.117412][T14060] ? __lock_acquire+0x6100/0x6100 [ 1181.117429][T14060] ? print_irqtrace_events+0x220/0x220 [ 1181.117450][T14060] ? _raw_spin_unlock_irqrestore+0xc1/0x120 [ 1181.117468][T14060] ? _raw_spin_unlock+0x40/0x40 [ 1181.117487][T14060] security_sb_mount+0x70/0xd0 [ 1181.117507][T14060] path_mount+0x12e/0x2c00 [ 1181.162054][T14060] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1181.163064][T14080] validate_nla: 18 callbacks suppressed [ 1181.163077][T14080] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1181.168040][T14060] ? slab_free_freelist_hook+0x1e8/0x2a0 [ 1181.168066][T14060] ? mark_mounts_for_expiry+0x520/0x520 [ 1181.168085][T14060] ? trace_kmem_cache_free+0x2e/0xe0 [ 1181.168099][T14060] ? kmem_cache_free+0x112/0x170 [ 1181.168114][T14060] ? user_path_at_empty+0x153/0x1b0 [ 1181.168133][T14060] __se_sys_mount+0x2f9/0x3b0 [ 1181.168153][T14060] ? __x64_sys_mount+0xc0/0xc0 [ 1181.168168][T14060] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1181.223655][T14060] ? __x64_sys_mount+0x1c/0xc0 [ 1181.226079][T14057] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: casefold flag without casefold feature [ 1181.228536][T14060] do_syscall_64+0x3d/0xb0 [ 1181.228565][T14060] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1181.228584][T14060] RIP: 0033:0x467b1a [ 1181.255694][T14060] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1181.275304][T14060] RSP: 002b:00007f320bda2fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1181.283814][T14060] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 1181.291792][T14060] RDX: 0000000020000180 RSI: 00000000200001c0 RDI: 0000000000000000 [ 1181.300027][T14060] RBP: 00007f320bda3040 R08: 00007f320bda3040 R09: 0000000020000180 [ 1181.308006][T14060] R10: 0000000000002020 R11: 0000000000000202 R12: 0000000020000180 [ 1181.314358][T14057] EXT4-fs (loop1): corrupt root inode, run e2fsck 17:11:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000000)=@udp=r0}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) [ 1181.315975][T14060] R13: 00000000200001c0 R14: 00007f320bda3000 R15: 0000000020000100 [ 1181.332446][T14057] EXT4-fs (loop1): mount failed 17:11:31 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="03000005000000000065352d0eaf1630838f21329e1844622eac64513781243f2336d2455070fc692a1ac6c4653a459e428e49a7101a194e284bab7636b7b5557ebc60f0b0fa54bfd19c00c467cfa543638de201938f3aa46e0549a1fb15137868b59e446f21e1f3d2f1c53fe01c3380e051770bc40d57c1aef93da2fdf072c135f78213f736ac4a6a474f91820d213d787b1203dc00a2bfdc45d7e6142706f77f53e11e25755d9bf090789d0f043ab89ba4d279105b3c1612b13e846a312cf4d8def6f90cec4ac7f9843ff878cce8b57d1f09c16278dcfb3d851fd426963f729eb9ed99c195404d4078881628d7d8939ed0a3ae322ff9fc1acf1342291c3ba6ad62e503b106d8939a66165c099edbbb59f2db5889c96797e0b6fe42cf4c5118", 0x120, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:31 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x40, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}}, 0x0) 17:11:31 executing program 5 (fault-call:4 fault-nth:9): syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:31 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[], 0x30}}, 0x0) 17:11:31 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x40, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x40}}, 0x0) 17:11:31 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) [ 1181.497520][T14098] FAULT_INJECTION: forcing a failure. [ 1181.497520][T14098] name failslab, interval 1, probability 0, space 0, times 0 [ 1181.512420][T14101] loop1: detected capacity change from 0 to 256 17:11:31 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[], 0x30}}, 0x0) [ 1181.538756][T14102] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1181.540584][T14101] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 1181.574316][T14102] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1181.579219][T14098] CPU: 1 PID: 14098 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 1181.591048][T14098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1181.601088][T14098] Call Trace: [ 1181.604373][T14098] dump_stack_lvl+0x1d3/0x29f [ 1181.609039][T14098] ? show_regs_print_info+0x12/0x12 [ 1181.614218][T14098] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 1181.619918][T14098] ? __might_sleep+0x100/0x100 [ 1181.624661][T14098] ? __might_sleep+0x100/0x100 [ 1181.629403][T14098] should_fail+0x384/0x4b0 [ 1181.633804][T14098] ? tomoyo_realpath_from_path+0xd8/0x610 [ 1181.639510][T14098] should_failslab+0x5/0x20 [ 1181.644002][T14098] __kmalloc+0x89/0x390 [ 1181.648141][T14098] ? tomoyo_realpath_from_path+0xcb/0x610 [ 1181.653852][T14098] ? trace_kfree+0x2e/0xd0 [ 1181.658245][T14098] ? kfree+0x2d/0x2e0 [ 1181.662205][T14098] ? __kmalloc+0xb4/0x390 [ 1181.666518][T14098] tomoyo_realpath_from_path+0xd8/0x610 [ 1181.672051][T14098] tomoyo_mount_permission+0x314/0xae0 [ 1181.677526][T14098] ? stack_trace_save+0x104/0x1e0 [ 1181.682535][T14098] ? stack_trace_snprint+0xe0/0xe0 [ 1181.687632][T14098] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1181.693251][T14098] ? asan.module_dtor+0x20/0x20 [ 1181.698079][T14098] ? bpf_lsm_inode_permission+0x5/0x10 [ 1181.703520][T14098] ? kmem_cache_free+0x85/0x170 [ 1181.708368][T14098] ? user_path_at_empty+0x153/0x1b0 [ 1181.713546][T14098] ? __se_sys_mount+0x2be/0x3b0 [ 1181.718374][T14098] ? do_syscall_64+0x3d/0xb0 [ 1181.722943][T14098] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1181.728995][T14098] ? do_raw_spin_lock+0x151/0x8e0 [ 1181.734013][T14098] ? print_irqtrace_events+0x220/0x220 [ 1181.739452][T14098] ? _raw_spin_unlock_irqrestore+0xc1/0x120 [ 1181.745325][T14098] ? _raw_spin_unlock+0x40/0x40 [ 1181.750166][T14098] security_sb_mount+0x70/0xd0 [ 1181.754913][T14098] path_mount+0x12e/0x2c00 [ 1181.759311][T14098] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1181.765280][T14098] ? slab_free_freelist_hook+0x1e8/0x2a0 [ 1181.770890][T14098] ? mark_mounts_for_expiry+0x520/0x520 [ 1181.776415][T14098] ? trace_kmem_cache_free+0x2e/0xe0 [ 1181.781679][T14098] ? kmem_cache_free+0x112/0x170 [ 1181.786596][T14098] ? user_path_at_empty+0x153/0x1b0 [ 1181.791784][T14098] __se_sys_mount+0x2f9/0x3b0 [ 1181.796445][T14098] ? __x64_sys_mount+0xc0/0xc0 [ 1181.801190][T14098] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1181.807152][T14098] ? __x64_sys_mount+0x1c/0xc0 [ 1181.811914][T14098] do_syscall_64+0x3d/0xb0 [ 1181.816312][T14098] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1181.822185][T14098] RIP: 0033:0x467b1a [ 1181.826061][T14098] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1181.845645][T14098] RSP: 002b:00007f320bda2fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1181.854037][T14098] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 1181.861993][T14098] RDX: 0000000020000180 RSI: 00000000200001c0 RDI: 0000000000000000 [ 1181.869954][T14098] RBP: 00007f320bda3040 R08: 00007f320bda3040 R09: 0000000020000180 [ 1181.877906][T14098] R10: 0000000000002020 R11: 0000000000000202 R12: 0000000020000180 17:11:31 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x44, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x0) [ 1181.885854][T14098] R13: 00000000200001c0 R14: 00007f320bda3000 R15: 0000000020000100 [ 1181.907990][T14098] ERROR: Out of memory at tomoyo_realpath_from_path. 17:11:31 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1181.940732][T14101] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: casefold flag without casefold feature [ 1181.960982][T14101] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 1181.969128][T14101] EXT4-fs (loop1): mount failed [ 1181.995252][T14119] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1182.010612][T14119] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:11:31 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x120, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:31 executing program 5 (fault-call:4 fault-nth:10): syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:31 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB], 0x30}}, 0x0) 17:11:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x44, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x0) 17:11:31 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:31 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x44, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x44}}, 0x0) 17:11:32 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) [ 1182.099999][T14130] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1182.139540][T14130] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:11:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x38, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x38}}, 0x0) 17:11:32 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB], 0x30}}, 0x0) [ 1182.155993][T14136] loop1: detected capacity change from 0 to 256 [ 1182.179843][T14134] FAULT_INJECTION: forcing a failure. [ 1182.179843][T14134] name failslab, interval 1, probability 0, space 0, times 0 [ 1182.218684][T14136] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 1182.240737][T14134] CPU: 0 PID: 14134 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 1182.249170][T14134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1182.259228][T14134] Call Trace: [ 1182.262516][T14134] dump_stack_lvl+0x1d3/0x29f [ 1182.267208][T14134] ? show_regs_print_info+0x12/0x12 [ 1182.272415][T14134] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 1182.278142][T14134] ? prepend_path+0xa66/0xc10 [ 1182.282833][T14134] ? __might_sleep+0x100/0x100 [ 1182.287605][T14134] should_fail+0x384/0x4b0 [ 1182.292028][T14134] ? tomoyo_encode2+0x25a/0x560 [ 1182.296389][T14136] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: casefold flag without casefold feature [ 1182.296874][T14134] should_failslab+0x5/0x20 [ 1182.296897][T14134] __kmalloc+0x89/0x390 17:11:32 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB], 0x30}}, 0x0) [ 1182.296914][T14134] ? prepend_path+0xc10/0xc10 [ 1182.322991][T14134] ? __kmalloc+0x2f8/0x390 [ 1182.327417][T14134] tomoyo_encode2+0x25a/0x560 [ 1182.332099][T14134] tomoyo_realpath_from_path+0x5c3/0x610 [ 1182.337741][T14134] tomoyo_mount_permission+0x314/0xae0 [ 1182.339226][T14136] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 1182.343199][T14134] ? stack_trace_save+0x104/0x1e0 [ 1182.343223][T14134] ? stack_trace_snprint+0xe0/0xe0 [ 1182.343239][T14134] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1182.365296][T14134] ? asan.module_dtor+0x20/0x20 [ 1182.370127][T14134] ? bpf_lsm_inode_permission+0x5/0x10 [ 1182.375573][T14134] ? kmem_cache_free+0x85/0x170 [ 1182.380404][T14134] ? user_path_at_empty+0x153/0x1b0 [ 1182.385584][T14134] ? __se_sys_mount+0x2be/0x3b0 [ 1182.390413][T14134] ? do_syscall_64+0x3d/0xb0 [ 1182.395007][T14134] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1182.401055][T14134] ? do_raw_spin_lock+0x151/0x8e0 [ 1182.406061][T14134] ? print_irqtrace_events+0x220/0x220 [ 1182.411502][T14134] ? _raw_spin_unlock_irqrestore+0xc1/0x120 [ 1182.417375][T14134] ? _raw_spin_unlock+0x40/0x40 [ 1182.422207][T14134] security_sb_mount+0x70/0xd0 [ 1182.426952][T14134] path_mount+0x12e/0x2c00 [ 1182.431354][T14134] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1182.437315][T14134] ? slab_free_freelist_hook+0x1e8/0x2a0 [ 1182.442940][T14134] ? mark_mounts_for_expiry+0x520/0x520 [ 1182.448468][T14134] ? trace_kmem_cache_free+0x2e/0xe0 [ 1182.453736][T14134] ? kmem_cache_free+0x112/0x170 [ 1182.458654][T14134] ? user_path_at_empty+0x153/0x1b0 [ 1182.463832][T14134] __se_sys_mount+0x2f9/0x3b0 [ 1182.468505][T14134] ? __x64_sys_mount+0xc0/0xc0 [ 1182.473267][T14134] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1182.479240][T14134] ? __x64_sys_mount+0x1c/0xc0 [ 1182.484003][T14134] do_syscall_64+0x3d/0xb0 [ 1182.488404][T14134] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1182.494290][T14134] RIP: 0033:0x467b1a [ 1182.498166][T14134] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:11:32 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) [ 1182.517753][T14134] RSP: 002b:00007f320bda2fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1182.526145][T14134] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 1182.534096][T14134] RDX: 0000000020000180 RSI: 00000000200001c0 RDI: 0000000000000000 [ 1182.542045][T14134] RBP: 00007f320bda3040 R08: 00007f320bda3040 R09: 0000000020000180 [ 1182.549998][T14134] R10: 0000000000002020 R11: 0000000000000202 R12: 0000000020000180 [ 1182.557947][T14134] R13: 00000000200001c0 R14: 00007f320bda3000 R15: 0000000020000100 [ 1182.610448][T14134] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1182.611367][T14136] EXT4-fs (loop1): mount failed 17:11:32 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="03000005000000000065352d0eaf1630838f21329e1844622eac64513781243f2336d2455070fc692a1ac6c4653a459e428e49a7101a194e284bab7636b7b5557ebc60f0b0fa54bfd19c00c467cfa543638de201938f3aa46e0549a1fb15137868b59e446f21e1f3d2f1c53fe01c3380e051770bc40d57c1aef93da2fdf072c135f78213f736ac4a6a474f91820d213d787b1203dc00a2bfdc45d7e6142706f77f53e11e25755d9bf090789d0f043ab89ba4d279105b3c1612b13e846a312cf4d8def6f90cec4ac7f9843ff878cce8b57d1f09c16278dcfb3d851fd426963f729eb9ed99c195404d4078881628d7d8939ed0a3ae322ff9fc1acf1342291c3ba6ad62e503b106d8939a66165c099edbbb59f2db5889c96797e0b6fe42cf4c5118", 0x120, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:32 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x38, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x38}}, 0x0) 17:11:32 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x0, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:32 executing program 5 (fault-call:4 fault-nth:11): syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:32 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc01000000000200800004000000"], 0x30}}, 0x0) [ 1182.741869][T14170] loop1: detected capacity change from 0 to 256 [ 1182.750970][T14167] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1182.751518][T14169] FAULT_INJECTION: forcing a failure. [ 1182.751518][T14169] name failslab, interval 1, probability 0, space 0, times 0 17:11:32 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x38, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x38}}, 0x0) [ 1182.783437][T14172] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1182.787131][T14170] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 1182.800231][T14167] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1182.818768][T14169] CPU: 0 PID: 14169 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 1182.827195][T14169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1182.837255][T14169] Call Trace: [ 1182.840531][T14169] dump_stack_lvl+0x1d3/0x29f [ 1182.845196][T14169] ? show_regs_print_info+0x12/0x12 [ 1182.850636][T14169] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 1182.856341][T14169] should_fail+0x384/0x4b0 [ 1182.860741][T14169] ? tomoyo_encode2+0x25a/0x560 [ 1182.865571][T14169] should_failslab+0x5/0x20 [ 1182.870054][T14169] __kmalloc+0x89/0x390 [ 1182.874191][T14169] tomoyo_encode2+0x25a/0x560 [ 1182.878868][T14169] tomoyo_mount_permission+0x585/0xae0 [ 1182.884306][T14169] ? stack_trace_save+0x104/0x1e0 [ 1182.889310][T14169] ? stack_trace_snprint+0xe0/0xe0 [ 1182.894403][T14169] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1182.900018][T14169] ? asan.module_dtor+0x20/0x20 [ 1182.904857][T14169] ? bpf_lsm_inode_permission+0x5/0x10 [ 1182.910309][T14169] ? kmem_cache_free+0x85/0x170 [ 1182.915138][T14169] ? user_path_at_empty+0x153/0x1b0 [ 1182.920333][T14169] ? __se_sys_mount+0x2be/0x3b0 [ 1182.925164][T14169] ? do_syscall_64+0x3d/0xb0 [ 1182.929734][T14169] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1182.935781][T14169] ? do_raw_spin_lock+0x151/0x8e0 [ 1182.940786][T14169] ? print_irqtrace_events+0x220/0x220 [ 1182.946238][T14169] ? _raw_spin_unlock_irqrestore+0xc1/0x120 [ 1182.952109][T14169] ? _raw_spin_unlock+0x40/0x40 [ 1182.956942][T14169] security_sb_mount+0x70/0xd0 [ 1182.961687][T14169] path_mount+0x12e/0x2c00 [ 1182.966086][T14169] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1182.972133][T14169] ? slab_free_freelist_hook+0x1e8/0x2a0 [ 1182.977831][T14169] ? mark_mounts_for_expiry+0x520/0x520 [ 1182.983358][T14169] ? trace_kmem_cache_free+0x2e/0xe0 [ 1182.988621][T14169] ? kmem_cache_free+0x112/0x170 [ 1182.993537][T14169] ? user_path_at_empty+0x153/0x1b0 [ 1182.998728][T14169] __se_sys_mount+0x2f9/0x3b0 [ 1183.003388][T14169] ? __x64_sys_mount+0xc0/0xc0 [ 1183.008135][T14169] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1183.014269][T14169] ? __x64_sys_mount+0x1c/0xc0 [ 1183.019015][T14169] do_syscall_64+0x3d/0xb0 [ 1183.023428][T14169] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1183.029302][T14169] RIP: 0033:0x467b1a [ 1183.033174][T14169] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1183.052842][T14169] RSP: 002b:00007f320bda2fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1183.061234][T14169] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 1183.069198][T14169] RDX: 0000000020000180 RSI: 00000000200001c0 RDI: 0000000000000000 [ 1183.077150][T14169] RBP: 00007f320bda3040 R08: 00007f320bda3040 R09: 0000000020000180 [ 1183.085114][T14169] R10: 0000000000002020 R11: 0000000000000202 R12: 0000000020000180 17:11:32 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x0, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:33 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x0, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:33 executing program 4 (fault-call:1 fault-nth:0): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1183.093065][T14169] R13: 00000000200001c0 R14: 00007f320bda3000 R15: 0000000020000100 [ 1183.126095][T14170] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: casefold flag without casefold feature [ 1183.167547][T14184] FAULT_INJECTION: forcing a failure. [ 1183.167547][T14184] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1183.181547][T14184] CPU: 1 PID: 14184 Comm: syz-executor.4 Not tainted 5.14.0-syzkaller #0 [ 1183.189969][T14184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1183.200111][T14184] Call Trace: [ 1183.203391][T14184] dump_stack_lvl+0x1d3/0x29f [ 1183.207779][T14170] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 1183.208075][T14184] ? show_regs_print_info+0x12/0x12 [ 1183.208099][T14184] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 1183.225361][T14184] ? trace_lock_release+0x4f/0x150 [ 1183.230476][T14184] ? lock_release+0x81/0x7b0 [ 1183.235105][T14184] should_fail+0x384/0x4b0 [ 1183.238828][T14170] EXT4-fs (loop1): mount failed [ 1183.239522][T14184] _copy_from_user+0x2d/0x170 [ 1183.248997][T14184] __copy_msghdr_from_user+0x9b/0x740 [ 1183.254375][T14184] ? __ia32_sys_shutdown+0x60/0x60 [ 1183.259483][T14184] ? __fget_files+0x35a/0x390 [ 1183.264163][T14184] ? __fdget+0x183/0x210 [ 1183.268407][T14184] __sys_sendmsg+0x218/0x400 [ 1183.272999][T14184] ? ____sys_sendmsg+0x900/0x900 [ 1183.278031][T14184] ? trace_lock_release+0x4f/0x150 [ 1183.283142][T14184] ? lock_release+0x81/0x7b0 [ 1183.287732][T14184] ? trace_lock_release+0x4f/0x150 [ 1183.292883][T14184] ? read_lock_is_recursive+0x10/0x10 [ 1183.298265][T14184] ? read_lock_is_recursive+0x10/0x10 [ 1183.303636][T14184] ? __lock_acquire+0x6100/0x6100 [ 1183.308660][T14184] ? __fget_files+0x35a/0x390 [ 1183.313341][T14184] ? __lock_acquire+0x6100/0x6100 [ 1183.318372][T14184] ? account_other_time+0x63/0x280 [ 1183.323484][T14184] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1183.329116][T14184] ? print_irqtrace_events+0x220/0x220 [ 1183.334577][T14184] ? vtime_user_exit+0x2b2/0x3e0 [ 1183.339520][T14184] ? __context_tracking_exit+0x7a/0xd0 [ 1183.344980][T14184] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1183.350958][T14184] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1183.356926][T14184] do_syscall_64+0x3d/0xb0 [ 1183.361344][T14184] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1183.367236][T14184] RIP: 0033:0x4665f9 [ 1183.371158][T14184] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1183.390938][T14184] RSP: 002b:00007f8fc9c1a188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1183.399357][T14184] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1183.407332][T14184] RDX: 0000000000000000 RSI: 0000000020001780 RDI: 0000000000000003 17:11:33 executing program 5 (fault-call:4 fault-nth:12): syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:33 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x0, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) [ 1183.415320][T14184] RBP: 00007f8fc9c1a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1183.423293][T14184] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1183.431263][T14184] R13: 00007ffd4053389f R14: 00007f8fc9c1a300 R15: 0000000000022000 17:11:33 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:33 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc01000000000200800004000000"], 0x30}}, 0x0) 17:11:33 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:33 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x0, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:33 executing program 4 (fault-call:1 fault-nth:1): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1183.533686][T14193] FAULT_INJECTION: forcing a failure. [ 1183.533686][T14193] name failslab, interval 1, probability 0, space 0, times 0 [ 1183.560622][T14197] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1183.571336][T14202] loop1: detected capacity change from 0 to 256 [ 1183.580999][T14193] CPU: 0 PID: 14193 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 1183.589425][T14193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1183.599476][T14193] Call Trace: [ 1183.602773][T14193] dump_stack_lvl+0x1d3/0x29f [ 1183.607439][T14193] ? show_regs_print_info+0x12/0x12 [ 1183.612620][T14193] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 1183.618322][T14193] ? user_path_at_empty+0x153/0x1b0 [ 1183.623503][T14193] ? do_raw_spin_lock+0x151/0x8e0 [ 1183.628510][T14193] should_fail+0x384/0x4b0 [ 1183.632913][T14193] ? alloc_fs_context+0x64/0x830 [ 1183.637836][T14193] should_failslab+0x5/0x20 [ 1183.642318][T14193] kmem_cache_alloc_trace+0x6a/0x340 [ 1183.647584][T14193] ? cap_capable+0x27e/0x2d0 [ 1183.652156][T14193] alloc_fs_context+0x64/0x830 [ 1183.656902][T14193] ? bpf_lsm_capable+0x5/0x10 [ 1183.661614][T14193] ? security_capable+0xb1/0xd0 [ 1183.666445][T14193] path_mount+0x19a9/0x2c00 [ 1183.670963][T14193] ? slab_free_freelist_hook+0x1e8/0x2a0 [ 1183.676576][T14193] ? mark_mounts_for_expiry+0x520/0x520 [ 1183.682103][T14193] ? trace_kmem_cache_free+0x2e/0xe0 [ 1183.687626][T14193] ? kmem_cache_free+0x112/0x170 [ 1183.692553][T14193] ? user_path_at_empty+0x153/0x1b0 [ 1183.697734][T14193] __se_sys_mount+0x2f9/0x3b0 [ 1183.702397][T14193] ? __x64_sys_mount+0xc0/0xc0 [ 1183.707142][T14193] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1183.713106][T14193] ? __x64_sys_mount+0x1c/0xc0 [ 1183.717852][T14193] do_syscall_64+0x3d/0xb0 [ 1183.722260][T14193] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1183.728135][T14193] RIP: 0033:0x467b1a [ 1183.732010][T14193] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1183.751608][T14193] RSP: 002b:00007f320bda2fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1183.760002][T14193] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 1183.767956][T14193] RDX: 0000000020000180 RSI: 00000000200001c0 RDI: 0000000000000000 [ 1183.775907][T14193] RBP: 00007f320bda3040 R08: 00007f320bda3040 R09: 0000000020000180 17:11:33 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB='L'], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1183.783856][T14193] R10: 0000000000002020 R11: 0000000000000202 R12: 0000000020000180 [ 1183.791815][T14193] R13: 00000000200001c0 R14: 00007f320bda3000 R15: 0000000020000100 [ 1183.808381][T14198] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1183.819957][T14202] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 17:11:33 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x0, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) [ 1183.830973][T14209] FAULT_INJECTION: forcing a failure. [ 1183.830973][T14209] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1183.849409][T14202] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 1183.869615][T14202] EXT4-fs (loop1): mount failed [ 1183.874598][T14209] CPU: 1 PID: 14209 Comm: syz-executor.4 Not tainted 5.14.0-syzkaller #0 [ 1183.883017][T14209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1183.893064][T14209] Call Trace: [ 1183.896327][T14209] dump_stack_lvl+0x1d3/0x29f [ 1183.900993][T14209] ? show_regs_print_info+0x12/0x12 [ 1183.906171][T14209] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 1183.911881][T14209] ? __might_fault+0x91/0x110 [ 1183.916538][T14209] ? trace_lock_release+0x4f/0x150 [ 1183.921651][T14209] should_fail+0x384/0x4b0 [ 1183.926054][T14209] _copy_from_user+0x2d/0x170 [ 1183.930713][T14209] kstrtouint_from_user+0xc6/0x230 [ 1183.935818][T14209] ? kstrtol_from_user+0x180/0x180 [ 1183.940932][T14209] ? vfs_write+0x2b5/0xe60 [ 1183.945334][T14209] ? read_lock_is_recursive+0x10/0x10 [ 1183.950716][T14209] ? __mutex_trylock_common+0x198/0x2f0 [ 1183.956311][T14209] ? __might_sleep+0x100/0x100 [ 1183.961059][T14209] proc_fail_nth_write+0x8a/0x260 [ 1183.966071][T14209] ? proc_fail_nth_read+0x210/0x210 [ 1183.971261][T14209] ? proc_fail_nth_read+0x210/0x210 [ 1183.976452][T14209] vfs_write+0x327/0xe60 [ 1183.980692][T14209] ? file_end_write+0x230/0x230 [ 1183.985543][T14209] ? trace_lock_release+0x4f/0x150 [ 1183.990635][T14209] ? read_lock_is_recursive+0x10/0x10 [ 1183.995995][T14209] ? __fget_files+0x35a/0x390 [ 1184.000665][T14209] ? mutex_lock_nested+0x1a/0x20 [ 1184.005583][T14209] ? __fdget_pos+0x24e/0x2f0 [ 1184.010152][T14209] ? ksys_write+0x72/0x2a0 [ 1184.014561][T14209] ksys_write+0x171/0x2a0 [ 1184.018874][T14209] ? __ia32_sys_read+0x80/0x80 [ 1184.023619][T14209] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1184.029677][T14209] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1184.035639][T14209] do_syscall_64+0x3d/0xb0 [ 1184.040040][T14209] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1184.045926][T14209] RIP: 0033:0x4192df [ 1184.049800][T14209] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 1184.069559][T14209] RSP: 002b:00007f8fc9bf9170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1184.077952][T14209] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004192df 17:11:33 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc01000000000200800004000000"], 0x30}}, 0x0) [ 1184.085901][T14209] RDX: 0000000000000001 RSI: 00007f8fc9bf91e0 RDI: 0000000000000003 [ 1184.093862][T14209] RBP: 00007f8fc9bf91d0 R08: 0000000000000000 R09: 0000000000000000 [ 1184.101809][T14209] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 1184.109769][T14209] R13: 00007ffd4053389f R14: 00007f8fc9bf9300 R15: 0000000000022000 17:11:34 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) [ 1184.142097][T14214] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:11:34 executing program 5 (fault-call:4 fault-nth:13): syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:34 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB='L'], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:34 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) [ 1184.193897][T14217] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 17:11:34 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc"], 0x30}}, 0x0) 17:11:34 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) [ 1184.276815][T14226] FAULT_INJECTION: forcing a failure. [ 1184.276815][T14226] name failslab, interval 1, probability 0, space 0, times 0 [ 1184.288481][T14229] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1184.302767][T14234] loop1: detected capacity change from 0 to 256 [ 1184.312465][T14226] CPU: 1 PID: 14226 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 1184.320888][T14226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1184.330943][T14226] Call Trace: [ 1184.334221][T14226] dump_stack_lvl+0x1d3/0x29f [ 1184.338914][T14226] ? show_regs_print_info+0x12/0x12 [ 1184.344149][T14226] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 1184.349875][T14226] ? __might_sleep+0x100/0x100 [ 1184.354643][T14226] ? trace_lock_release+0x4f/0x150 [ 1184.358264][T14239] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1184.359750][T14226] ? lock_release+0x81/0x7b0 [ 1184.359774][T14226] ? read_lock_is_recursive+0x10/0x10 [ 1184.359790][T14226] should_fail+0x384/0x4b0 [ 1184.382162][T14226] ? shmem_init_fs_context+0x53/0x230 [ 1184.387546][T14226] should_failslab+0x5/0x20 [ 1184.392051][T14226] kmem_cache_alloc_trace+0x6a/0x340 [ 1184.397338][T14226] ? __rwlock_init+0x140/0x140 [ 1184.399925][T14242] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1184.402097][T14226] shmem_init_fs_context+0x53/0x230 [ 1184.402125][T14226] alloc_fs_context+0x691/0x830 [ 1184.420176][T14226] path_mount+0x19a9/0x2c00 [ 1184.424686][T14226] ? slab_free_freelist_hook+0x1e8/0x2a0 [ 1184.430313][T14226] ? mark_mounts_for_expiry+0x520/0x520 [ 1184.435862][T14226] ? trace_kmem_cache_free+0x2e/0xe0 [ 1184.440563][T14244] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1184.441139][T14226] ? kmem_cache_free+0x112/0x170 [ 1184.441162][T14226] ? user_path_at_empty+0x153/0x1b0 [ 1184.459293][T14226] __se_sys_mount+0x2f9/0x3b0 [ 1184.463978][T14226] ? __x64_sys_mount+0xc0/0xc0 [ 1184.468739][T14226] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1184.474723][T14226] ? __x64_sys_mount+0x1c/0xc0 [ 1184.479485][T14226] do_syscall_64+0x3d/0xb0 [ 1184.483903][T14226] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1184.489805][T14226] RIP: 0033:0x467b1a [ 1184.493697][T14226] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1184.513299][T14226] RSP: 002b:00007f320bda2fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 17:11:34 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB='L'], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:34 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c000180"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:34 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c000180"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:34 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c000180"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:34 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:34 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1184.521713][T14226] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 1184.529691][T14226] RDX: 0000000020000180 RSI: 00000000200001c0 RDI: 0000000000000000 [ 1184.537670][T14226] RBP: 00007f320bda3040 R08: 00007f320bda3040 R09: 0000000020000180 [ 1184.545641][T14226] R10: 0000000000002020 R11: 0000000000000202 R12: 0000000020000180 [ 1184.553600][T14226] R13: 00000000200001c0 R14: 00007f320bda3000 R15: 0000000020000100 [ 1184.568544][T14234] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 17:11:34 executing program 5 (fault-call:4 fault-nth:14): syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:34 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1184.592341][T14234] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 1184.615325][T14234] EXT4-fs (loop1): mount failed 17:11:34 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="03000005000000000065352d0eaf1630838f21329e1844622eac64513781243f2336d2455070fc692a1ac6c4653a459e428e49a7101a194e284bab7636b7b5557ebc60f0b0fa54bfd19c00c467cfa543638de201938f3aa46e0549a1fb15137868b59e446f21e1f3d2f1c53fe01c3380e051770bc40d57c1aef93da2fdf072c135f78213f736ac4a6a474f91820d213d787b1203dc00a2bfdc45d7e6142706f77f53e11e25755d9bf090789d0f043ab89ba4d279105b3c1612b13e846a312cf4d8def6f90cec4ac7f9843ff878cce8b57d1f09c16278dcfb3d851fd426963f729eb9ed99c195404d4078881628d7d8939ed0a3ae322ff9fc1acf1342291c3ba6ad62e503b106d8939a66165c099edbbb59f2db5889c96797e0b6fe42cf4c5118a5", 0x121}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:34 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:34 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc"], 0x30}}, 0x0) 17:11:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x2, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:34 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1184.699004][T14260] FAULT_INJECTION: forcing a failure. [ 1184.699004][T14260] name failslab, interval 1, probability 0, space 0, times 0 [ 1184.738625][T14260] CPU: 0 PID: 14260 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 17:11:34 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) [ 1184.739980][T14271] loop1: detected capacity change from 0 to 256 [ 1184.747053][T14260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1184.747067][T14260] Call Trace: [ 1184.747075][T14260] dump_stack_lvl+0x1d3/0x29f [ 1184.747099][T14260] ? show_regs_print_info+0x12/0x12 [ 1184.747116][T14260] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 1184.747136][T14260] ? trace_lock_release+0x4f/0x150 [ 1184.747152][T14260] ? shmem_init_fs_context+0x53/0x230 [ 1184.747174][T14260] should_fail+0x384/0x4b0 [ 1184.747193][T14260] ? vfs_parse_fs_string+0x158/0x280 [ 1184.802331][T14260] should_failslab+0x5/0x20 [ 1184.806825][T14260] __kmalloc_track_caller+0x8b/0x390 [ 1184.812102][T14260] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1184.817728][T14260] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1184.823710][T14260] ? memset+0x1f/0x40 [ 1184.827678][T14260] kmemdup_nul+0x27/0xa0 [ 1184.831908][T14260] vfs_parse_fs_string+0x158/0x280 [ 1184.837016][T14260] ? vfs_parse_fs_param+0x460/0x460 [ 1184.842197][T14260] ? smack_sb_eat_lsm_opts+0x894/0xa70 [ 1184.847647][T14260] ? bpf_lsm_sb_eat_lsm_opts+0x5/0x10 [ 1184.853005][T14260] shmem_parse_options+0x14f/0x200 [ 1184.858120][T14260] path_mount+0x19fc/0x2c00 [ 1184.862607][T14260] ? slab_free_freelist_hook+0x1e8/0x2a0 [ 1184.868222][T14260] ? mark_mounts_for_expiry+0x520/0x520 [ 1184.873765][T14260] ? trace_kmem_cache_free+0x2e/0xe0 [ 1184.879026][T14260] ? kmem_cache_free+0x112/0x170 [ 1184.883942][T14260] ? user_path_at_empty+0x153/0x1b0 [ 1184.889122][T14260] __se_sys_mount+0x2f9/0x3b0 [ 1184.893782][T14260] ? __x64_sys_mount+0xc0/0xc0 [ 1184.898528][T14260] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1184.904493][T14260] ? __x64_sys_mount+0x1c/0xc0 [ 1184.909237][T14260] do_syscall_64+0x3d/0xb0 [ 1184.913636][T14260] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1184.919510][T14260] RIP: 0033:0x467b1a [ 1184.923389][T14260] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1184.943156][T14260] RSP: 002b:00007f320bda2fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1184.951564][T14260] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000467b1a [ 1184.959531][T14260] RDX: 0000000020000180 RSI: 00000000200001c0 RDI: 0000000000000000 [ 1184.967489][T14260] RBP: 00007f320bda3040 R08: 00007f320bda3040 R09: 0000000020000180 [ 1184.975444][T14260] R10: 0000000000002020 R11: 0000000000000202 R12: 0000000020000180 [ 1184.983395][T14260] R13: 00000000200001c0 R14: 00007f320bda3000 R15: 0000000020000100 17:11:34 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc"], 0x30}}, 0x0) 17:11:34 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x3, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1185.002408][T14271] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 17:11:34 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:34 executing program 5 (fault-call:4 fault-nth:15): syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:34 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:34 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7"], 0x30}}, 0x0) [ 1185.060936][T14271] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 1185.080383][T14271] EXT4-fs (loop1): mount failed [ 1185.144787][T14292] FAULT_INJECTION: forcing a failure. [ 1185.144787][T14292] name failslab, interval 1, probability 0, space 0, times 0 [ 1185.163913][T14292] CPU: 0 PID: 14292 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 1185.172349][T14292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1185.182404][T14292] Call Trace: [ 1185.185682][T14292] dump_stack_lvl+0x1d3/0x29f [ 1185.190366][T14292] ? show_regs_print_info+0x12/0x12 [ 1185.195579][T14292] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 1185.201653][T14292] ? __might_sleep+0x100/0x100 [ 1185.206510][T14292] should_fail+0x384/0x4b0 [ 1185.210928][T14292] ? getname_flags+0xba/0x650 [ 1185.215608][T14292] should_failslab+0x5/0x20 [ 1185.220116][T14292] kmem_cache_alloc+0x6b/0x340 [ 1185.224883][T14292] getname_flags+0xba/0x650 [ 1185.229390][T14292] do_sys_openat2+0xba/0x4f0 [ 1185.234240][T14292] ? read_lock_is_recursive+0x10/0x10 [ 1185.239654][T14292] ? read_lock_is_recursive+0x10/0x10 [ 1185.245027][T14292] ? do_sys_open+0x220/0x220 [ 1185.249617][T14292] ? __lock_acquire+0x6100/0x6100 [ 1185.254712][T14292] __x64_sys_openat+0x243/0x290 [ 1185.259572][T14292] ? __ia32_sys_open+0x270/0x270 [ 1185.264515][T14292] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1185.270498][T14292] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1185.276482][T14292] do_syscall_64+0x3d/0xb0 [ 1185.280903][T14292] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1185.286798][T14292] RIP: 0033:0x4196e4 17:11:35 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x4, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:35 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:35 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7"], 0x30}}, 0x0) [ 1185.290695][T14292] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1185.310301][T14292] RSP: 002b:00007f320bda2f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1185.318731][T14292] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004196e4 [ 1185.326703][T14292] RDX: 0000000000010000 RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 1185.333049][T14303] loop1: detected capacity change from 0 to 256 17:11:35 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) [ 1185.334675][T14292] RBP: 00000000200001c0 R08: 0000000000000000 R09: 0000000020000180 [ 1185.334691][T14292] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1185.334702][T14292] R13: 00000000200001c0 R14: 00007f320bda3000 R15: 0000000020000100 [ 1185.373778][T14303] EXT4-fs (loop1): unsupported descriptor size 0 17:11:35 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:35 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x5, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:35 executing program 5 (fault-call:4 fault-nth:16): syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:35 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:35 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:35 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc0d00000000b7"], 0x30}}, 0x0) 17:11:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x6, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:35 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1185.536957][T14323] FAULT_INJECTION: forcing a failure. [ 1185.536957][T14323] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1185.584716][T14331] loop1: detected capacity change from 0 to 256 [ 1185.589149][T14323] CPU: 0 PID: 14323 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 1185.599389][T14323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1185.609428][T14323] Call Trace: [ 1185.612692][T14323] dump_stack_lvl+0x1d3/0x29f [ 1185.617361][T14323] ? show_regs_print_info+0x12/0x12 [ 1185.622542][T14323] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 1185.628243][T14323] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1185.633866][T14323] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1185.639826][T14323] ? do_raw_spin_unlock+0x134/0x8a0 [ 1185.645006][T14323] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1185.650644][T14323] should_fail+0x384/0x4b0 [ 1185.655049][T14323] strncpy_from_user+0x32/0x350 [ 1185.659969][T14323] getname_flags+0xf0/0x650 [ 1185.664455][T14323] do_sys_openat2+0xba/0x4f0 [ 1185.669023][T14323] ? read_lock_is_recursive+0x10/0x10 [ 1185.674375][T14323] ? __rcu_read_lock+0xb0/0xb0 [ 1185.679119][T14323] ? do_sys_open+0x220/0x220 [ 1185.683698][T14323] ? __lock_acquire+0x6100/0x6100 [ 1185.688965][T14323] __x64_sys_openat+0x243/0x290 [ 1185.693807][T14323] ? __ia32_sys_open+0x270/0x270 [ 1185.698730][T14323] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1185.704694][T14323] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1185.710654][T14323] do_syscall_64+0x3d/0xb0 [ 1185.715066][T14323] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1185.720942][T14323] RIP: 0033:0x4196e4 [ 1185.724826][T14323] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1185.744410][T14323] RSP: 002b:00007f320bda2f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1185.752804][T14323] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004196e4 [ 1185.760755][T14323] RDX: 0000000000010000 RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 1185.768704][T14323] RBP: 00000000200001c0 R08: 0000000000000000 R09: 0000000020000180 [ 1185.776653][T14323] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 17:11:35 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc"], 0x30}}, 0x0) 17:11:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x7, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:35 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) [ 1185.784602][T14323] R13: 00000000200001c0 R14: 00007f320bda3000 R15: 0000000020000100 [ 1185.821117][T14331] EXT4-fs (loop1): unsupported descriptor size 0 17:11:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x8, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:35 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:35 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:35 executing program 5 (fault-call:4 fault-nth:17): syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:35 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f14001000180044cc"], 0x30}}, 0x0) 17:11:35 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x9, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:35 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:35 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e17f1400"], 0x30}}, 0x0) [ 1185.961937][T14350] __nla_validate_parse: 11 callbacks suppressed [ 1185.961954][T14350] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1185.973414][T14359] loop1: detected capacity change from 0 to 256 [ 1185.998234][T14356] FAULT_INJECTION: forcing a failure. [ 1185.998234][T14356] name failslab, interval 1, probability 0, space 0, times 0 17:11:35 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) [ 1186.036033][T14359] EXT4-fs (loop1): unsupported descriptor size 0 [ 1186.045005][T14356] CPU: 1 PID: 14356 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 1186.053440][T14356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1186.063497][T14356] Call Trace: [ 1186.066784][T14356] dump_stack_lvl+0x1d3/0x29f [ 1186.071472][T14356] ? show_regs_print_info+0x12/0x12 [ 1186.076671][T14356] ? log_buf_vmcoreinfo_setup+0x498/0x498 17:11:35 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) [ 1186.082401][T14356] ? trace_lock_release+0x4f/0x150 [ 1186.087518][T14356] ? __might_sleep+0x100/0x100 [ 1186.092325][T14356] ? lock_release+0x81/0x7b0 [ 1186.096913][T14356] ? read_lock_is_recursive+0x10/0x10 [ 1186.102284][T14356] ? trace_lock_acquire+0x59/0x190 [ 1186.107400][T14356] should_fail+0x384/0x4b0 [ 1186.111825][T14356] ? __alloc_file+0x26/0x2f0 [ 1186.116420][T14356] should_failslab+0x5/0x20 [ 1186.120922][T14356] kmem_cache_alloc+0x6b/0x340 [ 1186.125699][T14356] __alloc_file+0x26/0x2f0 [ 1186.130199][T14356] ? alloc_empty_file+0x49/0x1b0 17:11:36 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) [ 1186.135143][T14356] alloc_empty_file+0xa9/0x1b0 [ 1186.139913][T14356] path_openat+0x114/0x3630 [ 1186.144422][T14356] ? arch_stack_walk+0x98/0xe0 [ 1186.149195][T14356] ? stack_trace_save+0x104/0x1e0 [ 1186.154225][T14356] ? stack_trace_snprint+0xe0/0xe0 [ 1186.159346][T14356] ? do_filp_open+0x4d0/0x4d0 [ 1186.164023][T14356] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1186.169659][T14356] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1186.175639][T14356] ? __kasan_slab_alloc+0xba/0xd0 [ 1186.180667][T14356] ? __kasan_slab_alloc+0xa3/0xd0 17:11:36 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1186.185697][T14356] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1186.191421][T14356] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1186.197404][T14356] ? do_syscall_64+0x3d/0xb0 [ 1186.202009][T14356] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1186.208101][T14356] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1186.213745][T14356] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1186.219754][T14356] do_filp_open+0x253/0x4d0 [ 1186.221825][T14375] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 17:11:36 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:36 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1186.224260][T14356] ? vfs_tmpfile+0x230/0x230 [ 1186.224288][T14356] ? __lock_acquire+0x6100/0x6100 [ 1186.224304][T14356] ? do_raw_spin_lock+0x151/0x8e0 [ 1186.248143][T14356] ? replace_fd+0x170/0x170 [ 1186.252653][T14356] ? do_raw_spin_unlock+0x134/0x8a0 [ 1186.257851][T14356] ? __check_object_size+0x2f3/0x3f0 [ 1186.263142][T14356] ? _raw_spin_unlock+0x24/0x40 [ 1186.267996][T14356] ? alloc_fd+0x5e1/0x680 [ 1186.272330][T14356] do_sys_openat2+0x124/0x4f0 [ 1186.277009][T14356] ? read_lock_is_recursive+0x10/0x10 [ 1186.282388][T14356] ? read_lock_is_recursive+0x10/0x10 [ 1186.287765][T14356] ? do_sys_open+0x220/0x220 [ 1186.292358][T14356] ? __lock_acquire+0x6100/0x6100 [ 1186.297387][T14356] __x64_sys_openat+0x243/0x290 [ 1186.302242][T14356] ? __ia32_sys_open+0x270/0x270 [ 1186.303452][T14379] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1186.307179][T14356] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1186.307205][T14356] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1186.307221][T14356] do_syscall_64+0x3d/0xb0 [ 1186.332823][T14356] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1186.338724][T14356] RIP: 0033:0x4196e4 [ 1186.342617][T14356] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1186.362222][T14356] RSP: 002b:00007f320bda2f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1186.370639][T14356] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004196e4 [ 1186.378694][T14356] RDX: 0000000000010000 RSI: 00000000200001c0 RDI: 00000000ffffff9c 17:11:36 executing program 5 (fault-call:4 fault-nth:18): syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:36 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, 0x0, &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) [ 1186.386649][T14356] RBP: 00000000200001c0 R08: 0000000000000000 R09: 0000000020000180 [ 1186.394596][T14356] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1186.402541][T14356] R13: 00000000200001c0 R14: 00007f320bda3000 R15: 0000000020000100 [ 1186.453033][T14387] FAULT_INJECTION: forcing a failure. [ 1186.453033][T14387] name failslab, interval 1, probability 0, space 0, times 0 [ 1186.465949][T14387] CPU: 1 PID: 14387 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 1186.474375][T14387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1186.484418][T14387] Call Trace: [ 1186.487688][T14387] dump_stack_lvl+0x1d3/0x29f [ 1186.492358][T14387] ? show_regs_print_info+0x12/0x12 [ 1186.497538][T14387] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 1186.503238][T14387] ? trace_lock_release+0x4f/0x150 [ 1186.508329][T14387] ? __might_sleep+0x100/0x100 [ 1186.513072][T14387] ? lock_release+0x81/0x7b0 [ 1186.517641][T14387] should_fail+0x384/0x4b0 [ 1186.522044][T14387] ? security_file_alloc+0x32/0x1f0 [ 1186.527224][T14387] should_failslab+0x5/0x20 [ 1186.531705][T14387] kmem_cache_alloc+0x6b/0x340 [ 1186.536451][T14387] security_file_alloc+0x32/0x1f0 [ 1186.541457][T14387] __alloc_file+0xca/0x2f0 [ 1186.545861][T14387] alloc_empty_file+0xa9/0x1b0 [ 1186.550608][T14387] path_openat+0x114/0x3630 [ 1186.555108][T14387] ? arch_stack_walk+0x98/0xe0 [ 1186.559869][T14387] ? stack_trace_save+0x104/0x1e0 [ 1186.564879][T14387] ? stack_trace_snprint+0xe0/0xe0 [ 1186.569984][T14387] ? do_filp_open+0x4d0/0x4d0 [ 1186.574658][T14387] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1186.580284][T14387] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1186.586244][T14387] ? __kasan_slab_alloc+0xba/0xd0 [ 1186.591256][T14387] ? __kasan_slab_alloc+0xa3/0xd0 [ 1186.596263][T14387] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1186.601875][T14387] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1186.607831][T14387] ? do_syscall_64+0x3d/0xb0 [ 1186.612416][T14387] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1186.618463][T14387] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1186.624076][T14387] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1186.630043][T14387] do_filp_open+0x253/0x4d0 [ 1186.634531][T14387] ? vfs_tmpfile+0x230/0x230 [ 1186.639111][T14387] ? __lock_acquire+0x6100/0x6100 [ 1186.644112][T14387] ? do_raw_spin_lock+0x151/0x8e0 [ 1186.649114][T14387] ? replace_fd+0x170/0x170 [ 1186.653598][T14387] ? do_raw_spin_unlock+0x134/0x8a0 [ 1186.658773][T14387] ? __check_object_size+0x2f3/0x3f0 [ 1186.664041][T14387] ? _raw_spin_unlock+0x24/0x40 [ 1186.668871][T14387] ? alloc_fd+0x5e1/0x680 [ 1186.673182][T14387] do_sys_openat2+0x124/0x4f0 [ 1186.677838][T14387] ? read_lock_is_recursive+0x10/0x10 [ 1186.683187][T14387] ? read_lock_is_recursive+0x10/0x10 [ 1186.688535][T14387] ? do_sys_open+0x220/0x220 [ 1186.693105][T14387] ? __lock_acquire+0x6100/0x6100 [ 1186.698120][T14387] ? __se_sys_mount+0x31f/0x3b0 [ 1186.702954][T14387] __x64_sys_openat+0x243/0x290 [ 1186.707786][T14387] ? __ia32_sys_open+0x270/0x270 [ 1186.712702][T14387] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1186.718665][T14387] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1186.724625][T14387] do_syscall_64+0x3d/0xb0 [ 1186.729026][T14387] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1186.734898][T14387] RIP: 0033:0x4196e4 [ 1186.738770][T14387] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1186.758354][T14387] RSP: 002b:00007f320bda2f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1186.766744][T14387] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004196e4 [ 1186.774696][T14387] RDX: 0000000000010000 RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 1186.782646][T14387] RBP: 00000000200001c0 R08: 0000000000000000 R09: 0000000020000180 [ 1186.790593][T14387] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 17:11:36 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:36 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0xa, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:36 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc01000000000200800004000000"], 0x30}}, 0x0) 17:11:36 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, 0x0, &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) [ 1186.798542][T14387] R13: 00000000200001c0 R14: 00007f320bda3000 R15: 0000000020000100 17:11:36 executing program 5 (fault-call:4 fault-nth:19): syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:36 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, 0x0, &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0xf, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1186.895488][T14397] validate_nla: 13 callbacks suppressed [ 1186.895504][T14397] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1186.904688][T14400] loop1: detected capacity change from 0 to 256 17:11:36 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), 0x0}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:36 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc01000000000200800004000000"], 0x30}}, 0x0) 17:11:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x60, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1186.945506][T14400] EXT4-fs (loop1): unsupported descriptor size 0 [ 1186.956643][T14397] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1186.980254][T14403] FAULT_INJECTION: forcing a failure. [ 1186.980254][T14403] name failslab, interval 1, probability 0, space 0, times 0 [ 1187.026793][T14403] CPU: 1 PID: 14403 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 1187.035226][T14403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1187.045309][T14403] Call Trace: [ 1187.048582][T14403] dump_stack_lvl+0x1d3/0x29f [ 1187.053265][T14403] ? show_regs_print_info+0x12/0x12 [ 1187.058463][T14403] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 1187.064357][T14403] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1187.068225][T14418] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1187.070514][T14403] ? security_file_alloc+0x32/0x1f0 [ 1187.070545][T14403] should_fail+0x384/0x4b0 [ 1187.089375][T14403] ? security_file_alloc+0x32/0x1f0 [ 1187.094574][T14403] should_failslab+0x5/0x20 [ 1187.099079][T14403] kmem_cache_alloc+0x6b/0x340 [ 1187.103855][T14403] security_file_alloc+0x32/0x1f0 [ 1187.108881][T14403] __alloc_file+0xca/0x2f0 [ 1187.113331][T14403] alloc_empty_file+0xa9/0x1b0 [ 1187.118190][T14403] path_openat+0x114/0x3630 [ 1187.122696][T14403] ? arch_stack_walk+0x98/0xe0 [ 1187.127472][T14403] ? stack_trace_save+0x104/0x1e0 [ 1187.132498][T14403] ? stack_trace_snprint+0xe0/0xe0 [ 1187.137620][T14403] ? do_filp_open+0x4d0/0x4d0 [ 1187.142302][T14403] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1187.147936][T14403] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1187.153912][T14403] ? __kasan_slab_alloc+0xba/0xd0 [ 1187.158934][T14403] ? __kasan_slab_alloc+0xa3/0xd0 [ 1187.163959][T14403] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1187.169597][T14403] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1187.175573][T14403] ? do_syscall_64+0x3d/0xb0 [ 1187.180175][T14403] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1187.186243][T14403] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1187.191872][T14403] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1187.197858][T14403] do_filp_open+0x253/0x4d0 [ 1187.202362][T14403] ? vfs_tmpfile+0x230/0x230 [ 1187.206965][T14403] ? __lock_acquire+0x6100/0x6100 [ 1187.211984][T14403] ? do_raw_spin_lock+0x151/0x8e0 [ 1187.217007][T14403] ? replace_fd+0x170/0x170 [ 1187.221519][T14403] ? do_raw_spin_unlock+0x134/0x8a0 [ 1187.226737][T14403] ? __check_object_size+0x2f3/0x3f0 [ 1187.232059][T14403] ? _raw_spin_unlock+0x24/0x40 [ 1187.236997][T14403] ? alloc_fd+0x5e1/0x680 [ 1187.241338][T14403] do_sys_openat2+0x124/0x4f0 [ 1187.246020][T14403] ? read_lock_is_recursive+0x10/0x10 [ 1187.251392][T14403] ? read_lock_is_recursive+0x10/0x10 [ 1187.256764][T14403] ? do_sys_open+0x220/0x220 [ 1187.261352][T14403] ? __lock_acquire+0x6100/0x6100 [ 1187.266373][T14403] ? __se_sys_mount+0x31f/0x3b0 [ 1187.271228][T14403] __x64_sys_openat+0x243/0x290 [ 1187.276079][T14403] ? __ia32_sys_open+0x270/0x270 [ 1187.281016][T14403] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1187.287004][T14403] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1187.292983][T14403] do_syscall_64+0x3d/0xb0 [ 1187.297404][T14403] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1187.303471][T14403] RIP: 0033:0x4196e4 [ 1187.307366][T14403] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 17:11:36 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:36 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x300, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x500, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x600, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x700, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1187.326963][T14403] RSP: 002b:00007f320bda2f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1187.335378][T14403] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004196e4 [ 1187.343346][T14403] RDX: 0000000000010000 RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 1187.351315][T14403] RBP: 00000000200001c0 R08: 0000000000000000 R09: 0000000020000180 [ 1187.359284][T14403] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1187.367252][T14403] R13: 00000000200001c0 R14: 00007f320bda3000 R15: 0000000020000100 17:11:37 executing program 5 (fault-call:4 fault-nth:20): syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x900, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:37 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc01000000000200800004000000"], 0x30}}, 0x0) 17:11:37 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), 0x0}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) [ 1187.439848][T14441] loop1: detected capacity change from 0 to 256 [ 1187.475277][T14441] EXT4-fs (loop1): unsupported descriptor size 0 [ 1187.482636][T14442] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:11:37 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:37 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:37 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), 0x0}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) [ 1187.534836][T14451] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1187.570148][T14453] FAULT_INJECTION: forcing a failure. [ 1187.570148][T14453] name failslab, interval 1, probability 0, space 0, times 0 [ 1187.609833][T14453] CPU: 0 PID: 14453 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 1187.618364][T14453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1187.628505][T14453] Call Trace: [ 1187.631772][T14453] dump_stack_lvl+0x1d3/0x29f [ 1187.636441][T14453] ? show_regs_print_info+0x12/0x12 [ 1187.641644][T14453] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 1187.647346][T14453] ? prepend_path+0xa66/0xc10 [ 1187.652008][T14453] ? __might_sleep+0x100/0x100 [ 1187.656753][T14453] should_fail+0x384/0x4b0 [ 1187.661170][T14453] ? tomoyo_encode2+0x25a/0x560 [ 1187.666005][T14453] should_failslab+0x5/0x20 [ 1187.670490][T14453] __kmalloc+0x89/0x390 [ 1187.674625][T14453] ? prepend_path+0xc10/0xc10 [ 1187.679309][T14453] ? __kmalloc+0x2f8/0x390 [ 1187.683720][T14453] tomoyo_encode2+0x25a/0x560 [ 1187.688384][T14453] tomoyo_realpath_from_path+0x5c3/0x610 [ 1187.694002][T14453] tomoyo_check_open_permission+0x1f0/0x460 [ 1187.700074][T14453] ? tomoyo_check_path_number_acl+0x270/0x270 [ 1187.706125][T14453] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1187.711737][T14453] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1187.717706][T14453] ? smack_inode_rename+0x310/0x310 [ 1187.722885][T14453] ? __rwlock_init+0x140/0x140 [ 1187.727631][T14453] ? hook_file_open+0xed/0x220 [ 1187.732370][T14453] ? tomoyo_file_open+0xe6/0x170 [ 1187.737290][T14453] security_file_open+0x50/0x570 [ 1187.742210][T14453] do_dentry_open+0x36c/0x1020 [ 1187.746961][T14453] path_openat+0x2876/0x3630 [ 1187.751541][T14453] ? stack_trace_save+0x104/0x1e0 [ 1187.756551][T14453] ? do_filp_open+0x4d0/0x4d0 [ 1187.761210][T14453] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1187.766823][T14453] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1187.772882][T14453] ? __kasan_slab_alloc+0xba/0xd0 [ 1187.777887][T14453] ? __kasan_slab_alloc+0xa3/0xd0 [ 1187.782904][T14453] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1187.788529][T14453] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1187.794495][T14453] ? do_syscall_64+0x3d/0xb0 [ 1187.799071][T14453] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1187.805117][T14453] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1187.810731][T14453] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1187.816697][T14453] do_filp_open+0x253/0x4d0 [ 1187.821184][T14453] ? vfs_tmpfile+0x230/0x230 [ 1187.825817][T14453] ? do_raw_spin_unlock+0x134/0x8a0 [ 1187.830993][T14453] ? __check_object_size+0x2f3/0x3f0 [ 1187.836261][T14453] ? _raw_spin_unlock+0x24/0x40 [ 1187.841091][T14453] ? alloc_fd+0x5e1/0x680 [ 1187.845404][T14453] do_sys_openat2+0x124/0x4f0 [ 1187.850060][T14453] ? read_lock_is_recursive+0x10/0x10 [ 1187.855411][T14453] ? read_lock_is_recursive+0x10/0x10 [ 1187.860763][T14453] ? do_sys_open+0x220/0x220 [ 1187.865332][T14453] ? __lock_acquire+0x6100/0x6100 [ 1187.870333][T14453] ? __se_sys_mount+0x31f/0x3b0 [ 1187.875177][T14453] __x64_sys_openat+0x243/0x290 [ 1187.880011][T14453] ? __ia32_sys_open+0x270/0x270 [ 1187.884938][T14453] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1187.890896][T14453] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1187.896857][T14453] do_syscall_64+0x3d/0xb0 [ 1187.901256][T14453] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1187.907129][T14453] RIP: 0033:0x4196e4 [ 1187.911003][T14453] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1187.930588][T14453] RSP: 002b:00007f320bda2f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1187.938981][T14453] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004196e4 [ 1187.946941][T14453] RDX: 0000000000010000 RSI: 00000000200001c0 RDI: 00000000ffffff9c 17:11:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0xa00, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:37 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e1"], 0x30}}, 0x0) [ 1187.954909][T14453] RBP: 00000000200001c0 R08: 0000000000000000 R09: 0000000020000180 [ 1187.962868][T14453] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1187.970829][T14453] R13: 00000000200001c0 R14: 00007f320bda3000 R15: 0000000020000100 17:11:37 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0xf00, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1188.034011][T14463] loop1: detected capacity change from 0 to 256 17:11:37 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800e1"], 0x30}}, 0x0) [ 1188.082589][T14470] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1188.085027][T14463] EXT4-fs (loop1): unsupported descriptor size 0 17:11:38 executing program 5 (fault-call:4 fault-nth:21): syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:38 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:38 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x1df8, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:38 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc01000000000200800004000000"], 0x30}}, 0x0) 17:11:38 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) [ 1188.155636][T14453] ERROR: Out of memory at tomoyo_realpath_from_path. 17:11:38 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x2000, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1188.222716][T14486] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1188.241614][T14491] loop1: detected capacity change from 0 to 256 [ 1188.242027][T14488] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:11:38 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc01000000000200800004000000"], 0x30}}, 0x0) [ 1188.268100][T14491] EXT4-fs (loop1): unsupported descriptor size 0 [ 1188.281334][T14490] FAULT_INJECTION: forcing a failure. [ 1188.281334][T14490] name failslab, interval 1, probability 0, space 0, times 0 [ 1188.326027][T14490] CPU: 1 PID: 14490 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 1188.334555][T14490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1188.339443][T14500] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1188.344604][T14490] Call Trace: [ 1188.344614][T14490] dump_stack_lvl+0x1d3/0x29f [ 1188.344640][T14490] ? show_regs_print_info+0x12/0x12 [ 1188.366985][T14490] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 1188.372708][T14490] ? __might_sleep+0x100/0x100 [ 1188.377485][T14490] should_fail+0x384/0x4b0 [ 1188.381909][T14490] ? __d_alloc+0x2a/0x700 [ 1188.386237][T14490] ? simple_lookup+0xf0/0xf0 [ 1188.390826][T14490] should_failslab+0x5/0x20 [ 1188.395332][T14490] kmem_cache_alloc+0x6b/0x340 [ 1188.400107][T14490] ? simple_lookup+0xf0/0xf0 [ 1188.404695][T14490] __d_alloc+0x2a/0x700 [ 1188.408855][T14490] ? hook_file_open+0xed/0x220 [ 1188.413622][T14490] ? simple_lookup+0xf0/0xf0 [ 1188.418211][T14490] d_alloc_cursor+0x40/0xd0 17:11:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x6000, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:38 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc01000000000200800004000000"], 0x30}}, 0x0) [ 1188.422716][T14490] dcache_dir_open+0x37/0x70 [ 1188.427306][T14490] do_dentry_open+0x7cb/0x1020 [ 1188.432079][T14490] path_openat+0x2876/0x3630 [ 1188.436679][T14490] ? stack_trace_save+0x104/0x1e0 [ 1188.441710][T14490] ? do_filp_open+0x4d0/0x4d0 [ 1188.446387][T14490] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1188.447350][T14505] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1188.452017][T14490] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1188.452041][T14490] ? __kasan_slab_alloc+0xba/0xd0 17:11:38 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800"], 0x30}}, 0x0) [ 1188.452058][T14490] ? __kasan_slab_alloc+0xa3/0xd0 [ 1188.477284][T14490] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1188.482930][T14490] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1188.488910][T14490] ? do_syscall_64+0x3d/0xb0 [ 1188.493509][T14490] ? entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1188.499576][T14490] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1188.505215][T14490] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1188.511204][T14490] do_filp_open+0x253/0x4d0 [ 1188.515721][T14490] ? vfs_tmpfile+0x230/0x230 [ 1188.520321][T14490] ? do_raw_spin_unlock+0x134/0x8a0 [ 1188.525533][T14490] ? __check_object_size+0x2f3/0x3f0 [ 1188.530825][T14490] ? _raw_spin_unlock+0x24/0x40 [ 1188.535678][T14490] ? alloc_fd+0x5e1/0x680 [ 1188.540042][T14490] do_sys_openat2+0x124/0x4f0 [ 1188.544709][T14490] ? read_lock_is_recursive+0x10/0x10 [ 1188.550071][T14490] ? read_lock_is_recursive+0x10/0x10 [ 1188.555463][T14490] ? do_sys_open+0x220/0x220 [ 1188.560035][T14490] ? __lock_acquire+0x6100/0x6100 [ 1188.565038][T14490] ? __se_sys_mount+0x31f/0x3b0 [ 1188.569877][T14490] __x64_sys_openat+0x243/0x290 [ 1188.574738][T14490] ? __ia32_sys_open+0x270/0x270 [ 1188.579681][T14490] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1188.585655][T14490] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1188.591640][T14490] do_syscall_64+0x3d/0xb0 [ 1188.596051][T14490] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1188.601921][T14490] RIP: 0033:0x4196e4 [ 1188.605811][T14490] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 1188.625515][T14490] RSP: 002b:00007f320bda2f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 1188.634001][T14490] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004196e4 [ 1188.641957][T14490] RDX: 0000000000010000 RSI: 00000000200001c0 RDI: 00000000ffffff9c [ 1188.649918][T14490] RBP: 00000000200001c0 R08: 0000000000000000 R09: 0000000020000180 [ 1188.657866][T14490] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000010000 [ 1188.665887][T14490] R13: 00000000200001c0 R14: 00007f320bda3000 R15: 0000000020000100 17:11:38 executing program 5 (fault-call:4 fault-nth:22): syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0xf81d, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:38 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc010000000002008000040000001800"], 0x30}}, 0x0) 17:11:38 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:38 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:38 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000000380)="03000005000000000065352d0eaf1630838f21329e1844622eac64513781243f2336d2455070fc692a1ac6c4653a459e428e49a7101a194e284bab7636b7b5557ebc60f0b0fa54bfd19c00c467cfa543638de201938f3aa46e0549a1fb15137868b59e446f21e1f3d2f1c53fe01c3380e051770bc40d57c1aef93da2fdf072c135f78213f736ac4a6a474f91820d213d787b1203dc00a2bfdc45d7e6142706f77f53e11e25755d9bf090789d0f043ab89ba4d279105b3c1612b13e846a312cf4d8def6f90cec4ac7f9843ff878cce8b57d1f09c16278dcfb3d851fd426963f729eb9ed99c195404d4078881628d7d8939ed0a3ae322ff9fc1acf1342291c3ba6ad62e503b106d8939a66165c099edbbb59f2db5889c96797e0b6fe42cf4c5118a5", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x1000000, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:38 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) 17:11:38 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:38 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x2000000, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1188.802088][T14518] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1188.816986][T14523] FAULT_INJECTION: forcing a failure. [ 1188.816986][T14523] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1188.843813][T14525] loop1: detected capacity change from 0 to 256 17:11:38 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) [ 1188.880660][T14525] EXT4-fs (loop1): unsupported descriptor size 0 [ 1188.893070][T14523] CPU: 0 PID: 14523 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0 [ 1188.901504][T14523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1188.911566][T14523] Call Trace: [ 1188.914846][T14523] dump_stack_lvl+0x1d3/0x29f [ 1188.916283][T14536] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1188.919533][T14523] ? show_regs_print_info+0x12/0x12 [ 1188.919560][T14523] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 1188.938576][T14523] ? lock_release+0x81/0x7b0 [ 1188.943176][T14523] ? snprintf+0xc0/0x110 [ 1188.947427][T14523] should_fail+0x384/0x4b0 [ 1188.951851][T14523] _copy_to_user+0x2d/0x130 [ 1188.956358][T14523] simple_read_from_buffer+0xd9/0x160 [ 1188.961736][T14523] proc_fail_nth_read+0x195/0x210 [ 1188.966765][T14523] ? proc_fault_inject_write+0x370/0x370 [ 1188.972406][T14523] ? security_file_permission+0x46b/0x5d0 [ 1188.978126][T14523] ? proc_fault_inject_write+0x370/0x370 [ 1188.983762][T14523] vfs_read+0x324/0xe30 [ 1188.987929][T14523] ? kernel_read+0x200/0x200 [ 1188.992517][T14523] ? trace_lock_release+0x4f/0x150 [ 1188.997635][T14523] ? read_lock_is_recursive+0x10/0x10 [ 1189.003020][T14523] ? __fget_files+0x35a/0x390 [ 1189.007710][T14523] ? mutex_lock_nested+0x1a/0x20 [ 1189.012650][T14523] ? __fdget_pos+0x24e/0x2f0 [ 1189.017245][T14523] ? ksys_read+0x72/0x2a0 [ 1189.021580][T14523] ksys_read+0x171/0x2a0 [ 1189.025831][T14523] ? vfs_write+0xe60/0xe60 [ 1189.030252][T14523] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1189.036237][T14523] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1189.042224][T14523] do_syscall_64+0x3d/0xb0 [ 1189.046647][T14523] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1189.052544][T14523] RIP: 0033:0x41937c [ 1189.056439][T14523] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 17:11:39 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:39 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB, @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:39 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) 17:11:39 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc01000000000200800004000000"], 0x30}}, 0x0) 17:11:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x3000000, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1189.076044][T14523] RSP: 002b:00007f320bda3170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1189.084457][T14523] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 000000000041937c [ 1189.092416][T14523] RDX: 000000000000000f RSI: 00007f320bda31e0 RDI: 0000000000000005 [ 1189.100370][T14523] RBP: 00007f320bda31d0 R08: 0000000000000000 R09: 0000000020000180 [ 1189.108361][T14523] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1189.116312][T14523] R13: 00007ffe6932ad8f R14: 00007f320bda3300 R15: 0000000000022000 17:11:39 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:39 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) [ 1189.207644][T14549] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:11:39 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB, @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:39 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x2, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x4000000, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1189.258538][T14556] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1189.298640][T14558] loop1: detected capacity change from 0 to 256 17:11:39 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc01000000000200800004000000"], 0x30}}, 0x0) 17:11:39 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x5000000, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:39 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB, @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1189.342413][T14558] EXT4-fs (loop1): unsupported descriptor size 0 [ 1189.350600][T14565] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1189.353736][T14567] tmpfs: Unknown parameter 'Råtd' 17:11:39 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a", 0x10, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:39 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x3, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:39 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc01000000000200800004000000"], 0x30}}, 0x0) 17:11:39 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000200)="714a3516c6d24750a083a65a6bb39d9ee4208f27a1e3e69dc02d4321efaf3961d9d353763bd6b8f4045075e2804c36f4163340ae75b777499b0d081082b57fccb9ea1396f3"}, 0x20) 17:11:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x6000000, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1189.461923][T14579] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:11:39 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1189.519473][T14586] loop1: detected capacity change from 0 to 256 [ 1189.528440][T14588] tmpfs: Unknown parameter 'Råtd' 17:11:39 executing program 3 (fault-call:4 fault-nth:0): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:39 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x4, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x7000000, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:39 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, 0x0}, 0x20) [ 1189.566407][T14586] EXT4-fs (loop1): unsupported descriptor size 0 17:11:39 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a", 0x10, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) [ 1189.632177][T14601] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:11:39 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x8000000, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:39 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, 0x0}, 0x20) 17:11:39 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1189.709671][T14608] tmpfs: Unknown parameter 'Råtd' 17:11:39 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:39 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x5, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) [ 1189.768171][T14619] loop1: detected capacity change from 0 to 256 17:11:39 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:39 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, 0x0}, 0x20) 17:11:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x9000000, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:39 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x2, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:39 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x6, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) [ 1189.873732][T14629] tmpfs: Unknown parameter 'Råtd' [ 1189.880062][T14619] EXT4-fs (loop1): unsupported descriptor size 0 17:11:39 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a", 0x10, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0xa000000, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:39 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) 17:11:39 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x3, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:39 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d04000000000000000017000000", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0xf000000, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1190.043290][T14645] tmpfs: Unknown parameter 'Råtd' 17:11:39 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) 17:11:40 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d04000000000000000017000000", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:40 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x4, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:40 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x7, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) [ 1190.065094][T14653] loop1: detected capacity change from 0 to 256 [ 1190.098304][T14653] EXT4-fs (loop1): unsupported descriptor size 0 17:11:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x20000000, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:40 executing program 0 (fault-call:4 fault-nth:0): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) 17:11:40 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c89", 0x18, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x60000000, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1190.226986][T14672] tmpfs: Unknown parameter 'Råtd' 17:11:40 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x7, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:40 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d04000000000000000017000000", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:40 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x8, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x9effffff, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1190.277985][T14678] loop1: detected capacity change from 0 to 256 [ 1190.314739][T14682] FAULT_INJECTION: forcing a failure. [ 1190.314739][T14682] name fail_usercopy, interval 1, probability 0, space 0, times 0 17:11:40 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d040000000000000000170000000800", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1190.349052][T14678] EXT4-fs (loop1): unsupported descriptor size 0 [ 1190.349390][T14682] CPU: 1 PID: 14682 Comm: syz-executor.0 Not tainted 5.14.0-syzkaller #0 [ 1190.363797][T14682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1190.373853][T14682] Call Trace: [ 1190.377142][T14682] dump_stack_lvl+0x1d3/0x29f [ 1190.381828][T14682] ? show_regs_print_info+0x12/0x12 [ 1190.387052][T14682] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 1190.391671][T14691] tmpfs: Unknown parameter 'Råtd' [ 1190.392770][T14682] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1190.392794][T14682] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1190.409463][T14682] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1190.415101][T14682] should_fail+0x384/0x4b0 [ 1190.421268][T14682] _copy_from_user+0x2d/0x170 [ 1190.425957][T14682] __sys_bpf+0x282/0x11d60 [ 1190.430383][T14682] ? trace_lock_release+0x4f/0x150 [ 1190.435496][T14682] ? lock_release+0x81/0x7b0 [ 1190.440084][T14682] ? read_lock_is_recursive+0x10/0x10 17:11:40 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d040000000000000000170000000800", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1190.445457][T14682] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1190.451093][T14682] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1190.457159][T14682] ? __might_sleep+0x100/0x100 [ 1190.461923][T14682] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1190.467554][T14682] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1190.473541][T14682] ? trace_lock_acquire+0x59/0x190 [ 1190.478662][T14682] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1190.484051][T14682] ? trace_lock_release+0x4f/0x150 [ 1190.489172][T14682] ? rcu_read_lock_sched_held+0x5d/0x110 17:11:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0xefffffff, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:40 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d040000000000000000170000000800", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1190.494806][T14682] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1190.500808][T14682] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1190.506454][T14682] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1190.512445][T14682] ? lock_release+0x81/0x7b0 [ 1190.517043][T14682] ? read_lock_is_recursive+0x10/0x10 [ 1190.522426][T14682] ? trace_lock_release+0x4f/0x150 [ 1190.527539][T14682] ? lock_release+0x81/0x7b0 [ 1190.532127][T14682] ? rcu_read_lock_bh_held+0xf0/0xf0 [ 1190.537409][T14682] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1190.543046][T14682] ? __bpf_trace_rcu_stall_warning+0x10/0x10 17:11:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0xf0ffffff, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1190.549027][T14682] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1190.554664][T14682] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1190.560644][T14682] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1190.566275][T14682] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1190.572260][T14682] ? trace_lock_release+0x4f/0x150 [ 1190.577383][T14682] ? lock_release+0x81/0x7b0 [ 1190.581985][T14682] ? trace_lock_release+0x4f/0x150 [ 1190.587190][T14682] ? read_lock_is_recursive+0x10/0x10 [ 1190.592571][T14682] ? read_lock_is_recursive+0x10/0x10 [ 1190.597951][T14682] ? __lock_acquire+0x6100/0x6100 [ 1190.602980][T14682] ? __fget_files+0x35a/0x390 [ 1190.607675][T14682] ? __lock_acquire+0x6100/0x6100 [ 1190.612717][T14682] ? __context_tracking_exit+0x7a/0xd0 [ 1190.618184][T14682] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1190.624161][T14682] __x64_sys_bpf+0x78/0x90 [ 1190.628562][T14682] do_syscall_64+0x3d/0xb0 [ 1190.633009][T14682] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1190.638897][T14682] RIP: 0033:0x4665f9 [ 1190.642766][T14682] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1190.662347][T14682] RSP: 002b:00007f5c3e248188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1190.670753][T14682] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1190.678705][T14682] RDX: 0000000000000020 RSI: 0000000020000040 RDI: 0000000000000003 [ 1190.686653][T14682] RBP: 00007f5c3e2481d0 R08: 0000000000000000 R09: 0000000000000000 17:11:40 executing program 0 (fault-call:4 fault-nth:1): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) [ 1190.694601][T14682] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1190.702551][T14682] R13: 00007ffe9aa6776f R14: 00007f5c3e248300 R15: 0000000000022000 17:11:40 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c89", 0x18, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:40 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d04000000000000000017000000080003", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0xf81d0000, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:40 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x9, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:40 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x8, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) [ 1190.808805][T14716] FAULT_INJECTION: forcing a failure. [ 1190.808805][T14716] name failslab, interval 1, probability 0, space 0, times 0 [ 1190.811076][T14718] loop1: detected capacity change from 0 to 256 17:11:40 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x9, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:40 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0xfcffffff, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1190.851246][T14719] tmpfs: Unknown parameter 'Råtd' [ 1190.874772][T14716] CPU: 0 PID: 14716 Comm: syz-executor.0 Not tainted 5.14.0-syzkaller #0 [ 1190.883218][T14716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1190.887140][T14718] EXT4-fs (loop1): unsupported descriptor size 0 [ 1190.893383][T14716] Call Trace: [ 1190.893395][T14716] dump_stack_lvl+0x1d3/0x29f [ 1190.893421][T14716] ? show_regs_print_info+0x12/0x12 [ 1190.913554][T14716] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 1190.919279][T14716] ? lock_release+0x81/0x7b0 17:11:40 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0xb, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) [ 1190.923885][T14716] ? __rcu_read_lock+0xb0/0xb0 [ 1190.928655][T14716] ? __might_sleep+0x100/0x100 [ 1190.933426][T14716] should_fail+0x384/0x4b0 [ 1190.937845][T14716] ? __sys_bpf+0x2c12/0x11d60 [ 1190.942535][T14716] should_failslab+0x5/0x20 [ 1190.947037][T14716] __kmalloc_track_caller+0x8b/0x390 [ 1190.952313][T14716] memdup_user+0x22/0xb0 [ 1190.956545][T14716] __sys_bpf+0x2c12/0x11d60 [ 1190.961033][T14716] ? trace_lock_release+0x4f/0x150 [ 1190.966127][T14716] ? lock_release+0x81/0x7b0 [ 1190.970698][T14716] ? read_lock_is_recursive+0x10/0x10 [ 1190.976048][T14716] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1190.981658][T14716] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1190.987631][T14716] ? __might_sleep+0x100/0x100 [ 1190.992374][T14716] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1190.998082][T14716] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1191.004227][T14716] ? trace_lock_acquire+0x59/0x190 [ 1191.009407][T14716] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1191.014763][T14716] ? trace_lock_release+0x4f/0x150 [ 1191.019856][T14716] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1191.025470][T14716] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1191.031434][T14716] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1191.037045][T14716] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1191.043001][T14716] ? lock_release+0x81/0x7b0 [ 1191.047575][T14716] ? read_lock_is_recursive+0x10/0x10 [ 1191.052928][T14716] ? trace_lock_release+0x4f/0x150 [ 1191.058017][T14716] ? lock_release+0x81/0x7b0 [ 1191.062585][T14716] ? rcu_read_lock_bh_held+0xf0/0xf0 [ 1191.067847][T14716] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1191.073458][T14716] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1191.079424][T14716] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1191.085051][T14716] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1191.091024][T14716] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1191.096742][T14716] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1191.102717][T14716] ? trace_lock_release+0x4f/0x150 [ 1191.107810][T14716] ? lock_release+0x81/0x7b0 [ 1191.112378][T14716] ? trace_lock_release+0x4f/0x150 [ 1191.117467][T14716] ? read_lock_is_recursive+0x10/0x10 [ 1191.122816][T14716] ? read_lock_is_recursive+0x10/0x10 [ 1191.128166][T14716] ? __lock_acquire+0x6100/0x6100 [ 1191.133167][T14716] ? __fget_files+0x35a/0x390 [ 1191.137837][T14716] ? __lock_acquire+0x6100/0x6100 [ 1191.142986][T14716] ? __context_tracking_exit+0x7a/0xd0 [ 1191.148439][T14716] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1191.154410][T14716] __x64_sys_bpf+0x78/0x90 [ 1191.158820][T14716] do_syscall_64+0x3d/0xb0 [ 1191.163227][T14716] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1191.169108][T14716] RIP: 0033:0x4665f9 [ 1191.172987][T14716] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1191.192583][T14716] RSP: 002b:00007f5c3e248188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1191.200977][T14716] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1191.208930][T14716] RDX: 0000000000000020 RSI: 0000000020000040 RDI: 0000000000000003 [ 1191.216881][T14716] RBP: 00007f5c3e2481d0 R08: 0000000000000000 R09: 0000000000000000 17:11:41 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d04000000000000000017000000080003", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:41 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0xa, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) [ 1191.224833][T14716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1191.232785][T14716] R13: 00007ffe9aa6776f R14: 00007f5c3e248300 R15: 0000000000022000 17:11:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0xffffff7f, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1191.331302][T14740] __nla_validate_parse: 9 callbacks suppressed [ 1191.331316][T14740] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1191.372896][T14743] tmpfs: Unknown parameter 'Råtd' 17:11:41 executing program 0 (fault-call:4 fault-nth:2): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) 17:11:41 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c89", 0x18, 0x4e0}, {&(0x7f0000000380)="03000005000000000065352d0eaf1630838f21329e1844622eac64513781243f2336d2455070fc692a1ac6c4653a459e428e49a7101a194e284bab7636b7b5557ebc60f0b0fa54bfd19c00c467cfa543638de201938f3aa46e0549a1fb15137868b59e446f21e1f3d2f1c53fe01c3380e051770bc40d57c1aef93da2fdf072c135f78213f736ac4a6a474f91820d213d787b1203dc00a2bfdc45d7e6142706f77f53e11e25755d9bf090789d0f043ab89ba4d279105b3c1612b13e846a312cf4d8def6f90cec4ac7f9843ff878cce8b57d1f09c16278dcfb3d851fd426963f729eb9ed99c195404d4078881628d7d8939ed0a3ae322ff9fc1acf1342291c3ba6ad62e503b106d8939a66165c099edbbb59f2db5889c96797e0b6fe42cf4c5118a5", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0xffffff9e, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:41 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d04000000000000000017000000080003", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:41 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0xf, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:41 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0xb, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) [ 1191.463035][T14751] FAULT_INJECTION: forcing a failure. [ 1191.463035][T14751] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1191.480943][T14752] loop1: detected capacity change from 0 to 256 [ 1191.496419][T14755] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.2'. 17:11:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0xffffffef, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:41 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x60, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) [ 1191.507364][T14752] EXT4-fs (loop1): unsupported descriptor size 0 [ 1191.526374][T14751] CPU: 1 PID: 14751 Comm: syz-executor.0 Not tainted 5.14.0-syzkaller #0 [ 1191.534989][T14751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1191.545041][T14751] Call Trace: [ 1191.548318][T14751] dump_stack_lvl+0x1d3/0x29f [ 1191.553014][T14751] ? show_regs_print_info+0x12/0x12 [ 1191.558222][T14751] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 1191.563950][T14751] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1191.569613][T14751] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1191.575611][T14751] should_fail+0x384/0x4b0 [ 1191.580041][T14751] _copy_from_user+0x2d/0x170 [ 1191.584726][T14751] memdup_user+0x5b/0xb0 [ 1191.588976][T14751] __sys_bpf+0x2c12/0x11d60 [ 1191.593496][T14751] ? trace_lock_release+0x4f/0x150 [ 1191.598615][T14751] ? lock_release+0x81/0x7b0 [ 1191.603213][T14751] ? read_lock_is_recursive+0x10/0x10 [ 1191.608595][T14751] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1191.614241][T14751] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1191.620239][T14751] ? __might_sleep+0x100/0x100 [ 1191.625018][T14751] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1191.630670][T14751] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1191.636655][T14751] ? trace_lock_acquire+0x59/0x190 [ 1191.641769][T14751] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1191.647153][T14751] ? trace_lock_release+0x4f/0x150 [ 1191.652266][T14751] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1191.657898][T14751] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1191.663887][T14751] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1191.669523][T14751] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1191.675515][T14751] ? lock_release+0x81/0x7b0 [ 1191.680120][T14751] ? read_lock_is_recursive+0x10/0x10 [ 1191.685512][T14751] ? trace_lock_release+0x4f/0x150 [ 1191.690723][T14751] ? lock_release+0x81/0x7b0 [ 1191.695341][T14751] ? rcu_read_lock_bh_held+0xf0/0xf0 [ 1191.700636][T14751] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1191.706288][T14751] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1191.712714][T14751] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1191.718355][T14751] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1191.724350][T14751] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1191.729990][T14751] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1191.735987][T14751] ? trace_lock_release+0x4f/0x150 [ 1191.741107][T14751] ? lock_release+0x81/0x7b0 [ 1191.745706][T14751] ? trace_lock_release+0x4f/0x150 [ 1191.750823][T14751] ? read_lock_is_recursive+0x10/0x10 [ 1191.756194][T14751] ? read_lock_is_recursive+0x10/0x10 [ 1191.761573][T14751] ? __lock_acquire+0x6100/0x6100 [ 1191.766595][T14751] ? __fget_files+0x35a/0x390 [ 1191.771274][T14751] ? __lock_acquire+0x6100/0x6100 [ 1191.776491][T14751] ? __context_tracking_exit+0x7a/0xd0 [ 1191.781957][T14751] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1191.787945][T14751] __x64_sys_bpf+0x78/0x90 [ 1191.792366][T14751] do_syscall_64+0x3d/0xb0 [ 1191.796790][T14751] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1191.802692][T14751] RIP: 0033:0x4665f9 [ 1191.806589][T14751] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1191.826192][T14751] RSP: 002b:00007f5c3e248188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1191.834612][T14751] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1191.842591][T14751] RDX: 0000000000000020 RSI: 0000000020000040 RDI: 0000000000000003 [ 1191.850563][T14751] RBP: 00007f5c3e2481d0 R08: 0000000000000000 R09: 0000000000000000 17:11:41 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r2, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0xfffffff0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:41 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r2, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:41 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r2, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1191.858535][T14751] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1191.866506][T14751] R13: 00007ffe9aa6776f R14: 00007f5c3e248300 R15: 0000000000022000 17:11:41 executing program 0 (fault-call:4 fault-nth:3): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) [ 1191.979329][T14760] tmpfs: Unknown parameter 'Råtd' 17:11:41 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r2, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:41 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045", 0x1c, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:41 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0xfffffffc, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:41 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0xc, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:41 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x300, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) [ 1192.048585][T14792] FAULT_INJECTION: forcing a failure. [ 1192.048585][T14792] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1192.087681][T14794] loop1: detected capacity change from 0 to 256 [ 1192.101461][T14792] CPU: 0 PID: 14792 Comm: syz-executor.0 Not tainted 5.14.0-syzkaller #0 [ 1192.109902][T14792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1192.119625][T14796] validate_nla: 13 callbacks suppressed [ 1192.119640][T14796] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1192.120518][T14792] Call Trace: [ 1192.120528][T14792] dump_stack_lvl+0x1d3/0x29f [ 1192.120554][T14792] ? show_regs_print_info+0x12/0x12 [ 1192.147227][T14792] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 1192.152951][T14792] ? lock_release+0x81/0x7b0 [ 1192.157539][T14792] ? snprintf+0xc0/0x110 [ 1192.161765][T14792] should_fail+0x384/0x4b0 [ 1192.166170][T14792] _copy_to_user+0x2d/0x130 [ 1192.170666][T14792] simple_read_from_buffer+0xd9/0x160 [ 1192.176035][T14792] proc_fail_nth_read+0x195/0x210 [ 1192.181065][T14792] ? proc_fault_inject_write+0x370/0x370 [ 1192.186696][T14792] ? security_file_permission+0x46b/0x5d0 [ 1192.192399][T14792] ? proc_fault_inject_write+0x370/0x370 [ 1192.198024][T14792] vfs_read+0x324/0xe30 [ 1192.202171][T14792] ? kernel_read+0x200/0x200 [ 1192.206741][T14792] ? trace_lock_release+0x4f/0x150 [ 1192.211833][T14792] ? read_lock_is_recursive+0x10/0x10 [ 1192.217184][T14792] ? __fget_files+0x35a/0x390 [ 1192.221842][T14792] ? mutex_lock_nested+0x1a/0x20 [ 1192.226848][T14792] ? __fdget_pos+0x24e/0x2f0 [ 1192.231419][T14792] ? ksys_read+0x72/0x2a0 [ 1192.235728][T14792] ksys_read+0x171/0x2a0 [ 1192.239953][T14792] ? vfs_write+0xe60/0xe60 [ 1192.244348][T14792] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1192.250315][T14792] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1192.256283][T14792] do_syscall_64+0x3d/0xb0 [ 1192.260684][T14792] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1192.266559][T14792] RIP: 0033:0x41937c [ 1192.270436][T14792] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1192.290193][T14792] RSP: 002b:00007f5c3e248170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 17:11:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x10, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1192.298604][T14792] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041937c [ 1192.306555][T14792] RDX: 000000000000000f RSI: 00007f5c3e2481e0 RDI: 0000000000000005 [ 1192.314505][T14792] RBP: 00007f5c3e2481d0 R08: 0000000000000000 R09: 0000000000000000 [ 1192.322558][T14792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1192.330508][T14792] R13: 00007ffe9aa6776f R14: 00007f5c3e248300 R15: 0000000000022000 17:11:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0xc0, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0xec0, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:42 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) [ 1192.370247][T14794] EXT4-fs (loop1): unsupported descriptor size 0 [ 1192.410327][T14801] tmpfs: Unknown parameter 'Råtd' 17:11:42 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x700, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:42 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0xd, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x33fe0, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:42 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r2, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:42 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045", 0x1c, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:42 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x900, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) [ 1192.530490][T14819] tmpfs: Unknown parameter 'Råtd' 17:11:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x2000170c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:42 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0xe, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:42 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) [ 1192.631905][T14831] loop1: detected capacity change from 0 to 256 [ 1192.659644][T14830] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:11:42 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0xb00, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x7ffff000, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1192.679566][T14836] tmpfs: Unknown parameter 'Råtd' 17:11:42 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x10, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:42 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x4, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) 17:11:42 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r2, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1192.724072][T14831] EXT4-fs (loop1): unsupported descriptor size 0 17:11:42 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0xf00, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:42 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x5, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) 17:11:42 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045", 0x1c, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0xfffffdef, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:42 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x11, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) [ 1192.869163][T14854] tmpfs: Unknown parameter 'Råtd' [ 1192.869902][T14855] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:11:42 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x4000, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:42 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0xb, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:42 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x6, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) [ 1192.919444][T14864] loop1: detected capacity change from 0 to 256 [ 1192.955592][T14864] EXT4-fs (loop1): unsupported descriptor size 0 17:11:42 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x6000, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:42 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f2800450100", 0x1e, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) [ 1193.034119][T14876] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1193.040087][T14872] tmpfs: Unknown parameter 'Råtd' 17:11:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x10, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:42 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:43 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x12, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:43 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x7, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) 17:11:43 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x30000, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) [ 1193.155185][T14889] loop1: detected capacity change from 0 to 256 17:11:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0xd, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1193.204073][T14889] EXT4-fs (loop1): unsupported descriptor size 0 [ 1193.219106][T14894] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:11:43 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x8, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) [ 1193.249662][T14899] tmpfs: Unknown parameter 'Råtd' 17:11:43 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x18, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:43 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x34000, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:43 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f2800450100", 0x1e, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:43 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x102, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:43 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x9, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) 17:11:43 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x400300, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x105, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1193.433977][T14920] loop1: detected capacity change from 0 to 256 [ 1193.452129][T14919] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1193.466744][T14924] tmpfs: Unknown parameter 'Råtd' 17:11:43 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0xa, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) 17:11:43 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:43 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x25, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:43 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x1000000, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) [ 1193.506825][T14920] EXT4-fs (loop1): unsupported descriptor size 0 17:11:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x106, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:43 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f2800450100", 0x1e, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) [ 1193.621884][T14941] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1193.644566][T14943] tmpfs: Unknown parameter 'Råtd' 17:11:43 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0xb, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) 17:11:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x108, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:43 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x45, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) [ 1193.671470][T14952] loop1: detected capacity change from 0 to 256 17:11:43 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x2000000, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:43 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1193.712766][T14952] EXT4-fs (loop1): unsupported descriptor size 0 17:11:43 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0xc, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) 17:11:43 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f}, {&(0x7f0000000380)="03000005000000000065352d0eaf1630838f21329e1844622eac64513781243f2336d2455070fc692a1ac6c4653a459e428e49a7101a194e284bab7636b7b5557ebc60f0b0fa54bfd19c00c467cfa543638de201938f3aa46e0549a1fb15137868b59e446f21e1f3d2f1c53fe01c3380e051770bc40d57c1aef93da2fdf072c135f78213f736ac4a6a474f91820d213d787b1203dc00a2bfdc45d7e6142706f77f53e11e25755d9bf090789d0f043ab89ba4d279105b3c1612b13e846a312cf4d8def6f90cec4ac7f9843ff878cce8b57d1f09c16278dcfb3d851fd426963f729eb9ed99c195404d4078881628d7d8939ed0a3ae322ff9fc1acf1342291c3ba6ad62e503b106d8939a66165c099edbbb59f2db5889c96797e0b6fe42cf4c5118a5", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x109, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1193.791103][T14966] tmpfs: Unknown parameter 'Råtd' 17:11:43 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x3000000, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:43 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0xd, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) [ 1193.819577][T14969] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1193.849270][T14980] loop1: detected capacity change from 0 to 256 17:11:43 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x47, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x10a, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:43 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0xe, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) 17:11:43 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:43 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x4000000, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) [ 1193.906648][T14980] EXT4-fs (loop1): unsupported descriptor size 0 17:11:43 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:43 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x10b, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1194.028935][T14999] tmpfs: Unknown parameter 'Råtd' 17:11:43 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0xf, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) 17:11:43 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x7000000, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:43 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x4b, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) [ 1194.049873][T15001] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1194.076843][T15008] loop1: detected capacity change from 0 to 256 17:11:43 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x110, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:44 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x8000000, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) [ 1194.114716][T15008] EXT4-fs (loop1): unsupported descriptor size 0 17:11:44 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x10, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) [ 1194.171665][T15020] tmpfs: Unknown parameter 'Råtd' 17:11:44 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f}, {&(0x7f0000000380)="03000005000000000065352d0eaf1630838f21329e1844622eac64513781243f2336d2455070fc692a1ac6c4653a459e428e49a7101a194e284bab7636b7b5557ebc60f0b0fa54bfd19c00c467cfa543638de201938f3aa46e0549a1fb15137868b59e446f21e1f3d2f1c53fe01c3380e051770bc40d57c1aef93da2fdf072c135f78213f736ac4a6a474f91820d213d787b1203dc00a2bfdc45d7e6142706f77f53e11e25755d9bf090789d0f043ab89ba4d279105b3c1612b13e846a312cf4d8def6f90cec4ac7f9843ff878cce8b57d1f09c16278dcfb3d851fd426963f729eb9ed99c195404d4078881628d7d8939ed0a3ae322ff9fc1acf1342291c3ba6ad62e503b106d8939a66165c099edbbb59f2db5889c96797e0b6fe42cf4c5118a5", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:44 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x4d, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x111, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1194.219316][T15022] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:11:44 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x11, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) 17:11:44 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:44 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x9000000, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x112, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1194.294881][T15035] loop1: detected capacity change from 0 to 256 17:11:44 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x12, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) 17:11:44 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x50, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) [ 1194.351149][T15035] EXT4-fs (loop1): unsupported descriptor size 0 [ 1194.364287][T15043] tmpfs: Unknown parameter 'Råtd' 17:11:44 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0xb000000, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:44 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:44 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:44 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x13, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) 17:11:44 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0xf000000, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x2, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:44 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x54, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) [ 1194.492721][T15066] loop1: detected capacity change from 0 to 256 [ 1194.503607][T15063] tmpfs: Unknown parameter 'Råtd' [ 1194.519551][T15066] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 17:11:44 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:44 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:44 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x14, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) 17:11:44 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x40000000, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x3, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:44 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x4, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:44 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x60000000, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:44 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) [ 1194.689881][T15090] loop1: detected capacity change from 0 to 256 [ 1194.694418][T15089] tmpfs: Unknown parameter 'Råtd' [ 1194.723995][T15090] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 17:11:44 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x5c, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:44 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0xffffff7f, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:44 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:44 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x5, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:44 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x16, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) [ 1194.895690][T15111] tmpfs: Unknown parameter 'Råtd' [ 1194.907420][T15121] loop1: detected capacity change from 0 to 256 17:11:44 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:44 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x65, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:44 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x6, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1194.947552][T15121] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 17:11:44 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x17, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) 17:11:44 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x7, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:44 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:44 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1195.023868][T15133] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1195.059168][T15136] tmpfs: Unknown parameter 'Råtd' 17:11:44 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x67, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:45 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1800000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:45 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x18, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) 17:11:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x8, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x9, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1195.173139][T15151] loop1: detected capacity change from 0 to 256 [ 1195.196432][T15155] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1195.208801][T15156] tmpfs: Unknown parameter 'Råtd' [ 1195.216127][T15151] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 17:11:45 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x19, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) 17:11:45 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="c000000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:45 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x6b, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:45 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:45 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r6, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0xa, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:45 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="c00e000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:45 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x1a, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) [ 1195.370711][T15178] loop1: detected capacity change from 0 to 256 [ 1195.391951][T15181] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 17:11:45 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0xf, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1195.419331][T15182] tmpfs: Unknown parameter 'Råtd' [ 1195.425341][T15178] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 17:11:45 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:45 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x6d, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:45 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x1b, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) 17:11:45 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="e03f030039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) [ 1195.518955][T15196] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 17:11:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x60, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:45 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1195.598270][T15204] tmpfs: Unknown parameter 'Råtd' [ 1195.601127][T15203] loop1: detected capacity change from 0 to 256 17:11:45 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x1c, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) 17:11:45 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3002002039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:45 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x70, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) [ 1195.638708][T15203] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 17:11:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x300, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:45 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:45 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="00f0ff7f39001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:45 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x1d, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) [ 1195.724720][T15218] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1195.740181][T15221] tmpfs: Unknown parameter 'Råtd' 17:11:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x500, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:45 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) 17:11:45 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x74, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x600, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1195.801816][T15230] loop1: detected capacity change from 0 to 256 [ 1195.829819][T15230] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 17:11:45 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:45 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="effdffff39001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:45 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x1e, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) [ 1195.886965][T15241] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1195.913864][T15245] tmpfs: Unknown parameter 'Råtd' 17:11:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x700, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:45 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x300, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:45 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) [ 1195.978731][T15252] loop1: detected capacity change from 0 to 256 17:11:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x900, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:45 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000010001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:45 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x21, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) [ 1196.025411][T15252] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 17:11:45 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) [ 1196.096679][T15265] tmpfs: Unknown parameter 'Råtd' 17:11:46 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x500, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0xa00, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1196.119977][T15270] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 17:11:46 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x22, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) 17:11:46 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) 17:11:46 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3002000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0xf00, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1196.202875][T15279] loop1: detected capacity change from 0 to 256 [ 1196.228580][T15279] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 17:11:46 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) [ 1196.271658][T15289] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1196.275397][T15291] tmpfs: Unknown parameter 'Råtd' 17:11:46 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x23, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) 17:11:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x1df8, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:46 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) 17:11:46 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x600, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:46 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3003000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) [ 1196.374195][T15303] loop1: detected capacity change from 0 to 256 [ 1196.413973][T15303] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 17:11:46 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200), 0x2}, 0x20) 17:11:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x2000, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:46 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3004000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:46 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) [ 1196.449717][T15313] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1196.462137][T15315] tmpfs: Unknown parameter 'Råtd' 17:11:46 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x700, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:46 executing program 2 (fault-call:7 fault-nth:0): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) 17:11:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x6000, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:46 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3007000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:46 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200), 0x7}, 0x20) 17:11:46 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) [ 1196.608035][T15333] loop1: detected capacity change from 0 to 256 17:11:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0xf81d, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:46 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3008000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) [ 1196.656252][T15337] tmpfs: Unknown parameter 'Råtd' [ 1196.661571][T15333] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 17:11:46 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:46 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x900, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:46 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200), 0x700}, 0x20) 17:11:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x1000000, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1196.761087][T15346] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1196.793518][T15356] tmpfs: Unknown parameter 'Råtd' 17:11:46 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0xa00, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:46 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3009000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:46 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r4, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) r6 = accept(r0, 0x0, &(0x7f0000000040)) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_GET_WOWLAN(r6, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80819008}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r7, 0x100, 0x70bd2c, 0x25dfdbfe, {{}, {@void, @val={0x8, 0x3, r8}, @val={0xc, 0x99, {0xffffffff, 0x1c}}}}, ["", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x10044800) 17:11:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x2000000, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:46 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200), 0x1000000}, 0x20) [ 1196.857559][T15361] loop1: detected capacity change from 0 to 256 [ 1196.896248][T15361] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 17:11:46 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="300b000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:46 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x3000000, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:46 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200), 0x2000000}, 0x20) [ 1196.950746][T15376] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1196.971382][T15374] tmpfs: Unknown parameter 'Råtd' 17:11:46 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000240)=[@sack_perm, @sack_perm, @sack_perm, @mss={0x2, 0x40617182}, @window={0x3, 0x0, 0x5980}, @timestamp, @window={0x3, 0xc68, 0x8}, @window={0x3, 0x7f, 0x2}, @timestamp], 0x9) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000440)=@assoc_value={0x0, 0x5}, 0x8) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_START(r5, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x820}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x14, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x40944}, 0x800) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r6, 0x8933, &(0x7f0000000080)={'wpan1\x00'}) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r6, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, 0x0, 0x200, 0x70bd29, 0x25dfdbff, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x5}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x1}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0302}}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x3}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x4) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 17:11:46 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="300f000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:46 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0xb00, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) [ 1197.051505][T15388] loop1: detected capacity change from 0 to 256 17:11:46 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x4000000, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:46 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200), 0x7000000}, 0x20) [ 1197.109715][T15388] EXT4-fs (loop1): invalid first ino: 0 [ 1197.130570][T15398] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 17:11:47 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3060000039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:47 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x5000000, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:47 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) [ 1197.209473][T15403] tmpfs: Unknown parameter 'Råtd' 17:11:47 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000030039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:47 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200), 0x100000000000000}, 0x20) [ 1197.250139][T15415] loop1: detected capacity change from 0 to 256 17:11:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x6000000, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:47 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0xc00, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) [ 1197.305071][T15415] EXT4-fs (loop1): invalid first ino: 0 [ 1197.305919][T15419] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 17:11:47 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000070039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:47 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200), 0x200000000000000}, 0x20) 17:11:47 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="03000005000000000065352d0eaf1630838f21329e1844622eac64513781243f2336d2455070fc692a1ac6c4653a459e428e49a7101a194e284bab7636b7b5557ebc60f0b0fa54bfd19c00c467cfa543638de201938f3aa46e0549a1fb15137868b59e446f21e1f3d2f1c53fe01c3380e051770bc40d57c1aef93da2fdf072c135f78213f736ac4a6a474f91820d213d787b1203dc00a2bfdc45d7e6142706f77f53e11e25755d9bf090789d0f043ab89ba4d279105b3c1612b13e846a312cf4d8def6f90cec4ac7f9843ff878cce8b57d1f09c16278dcfb3d851fd426963f729eb9ed99c195404d4078881628d7d8939ed0a3ae322ff9fc1acf1342291c3ba6ad62e503b106d8939a66165c099edbbb59f2db5889c96797e0b6fe42cf4c5118a5", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x7000000, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1197.455972][T15433] tmpfs: Unknown parameter 'Råtd' 17:11:47 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000090039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:47 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0xd00, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:47 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200), 0x700000000000000}, 0x20) [ 1197.503886][T15442] loop1: detected capacity change from 0 to 256 17:11:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x8000000, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:47 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="30000b0039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) [ 1197.554070][T15442] EXT4-fs (loop1): invalid first ino: 0 17:11:47 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x20010, r0, 0x1f533000) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r2, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000001c0)={'wpan1\x00', 0x0}) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nbd(&(0x7f0000000380), r6) sendmsg$NBD_CMD_CONNECT(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)={0x30, r8, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_SOCKETS={0x4}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}]}, 0x30}}, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="00020af80b739be1b8ca13cf28bd7000ffdbdf25050001000c000000000800010000001000000000000000003613b283c4631711f900e4ee6479f22612a13de1f51bc32c41775b883d45312578ec10ba64e044e8d08ff0e091298404e236cbc820133b5d27a28a8e0411859abe68a28f57bb"], 0x28}, 0x1, 0x0, 0x0, 0x4000080}, 0x80) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYRESOCT=r1, @ANYRES16=r4, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r5, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) 17:11:47 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="03000005000000000065352d0eaf1630838f21329e1844622eac64513781243f2336d2455070fc692a1ac6c4653a459e428e49a7101a194e284bab7636b7b5557ebc60f0b0fa54bfd19c00c467cfa543638de201938f3aa46e0549a1fb15137868b59e446f21e1f3d2f1c53fe01c3380e051770bc40d57c1aef93da2fdf072c135f78213f736ac4a6a474f91820d213d787b1203dc00a2bfdc45d7e6142706f77f53e11e25755d9bf090789d0f043ab89ba4d279105b3c1612b13e846a312cf4d8def6f90cec4ac7f9843ff878cce8b57d1f09c16278dcfb3d851fd426963f729eb9ed99c195404d4078881628d7d8939ed0a3ae322ff9fc1acf1342291c3ba6ad62e503b106d8939a66165c099edbbb59f2db5889c96797e0b6fe42cf4c5118a5", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:47 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) 17:11:47 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0xe00, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) [ 1197.630292][T15455] tmpfs: Unknown parameter 'Råtd' 17:11:47 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="30000f0039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x9000000, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:47 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETVERSION(r4, 0x40087602, &(0x7f0000000400)=0x3) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="6800000002c56e37f0585a065d9ea3efe7cdb2916817528fc95444a729c833e621dfaa63584cfa4bcd5330501d16a65596346c5466ae8ff4b7217dcb0941d054be6b601bc9b22a86a5799a3dbb922ee0f6c01e1014eb66945e626bca90e7530eb4369c067654ea7ea2b5662f70466813", @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c002e9b05000200000000002c00178020000000000000000000000000004fde4bc3a64b"], 0x68}}, 0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL802154_CMD_NEW_SEC_KEY(r6, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xbc, r2, 0x300, 0x70bd25, 0x25dfdbfe, {}, [@NL802154_ATTR_SEC_KEY={0x9c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "bc6cede4acbd300dbddb65fb5aab4c90e856feb7f6461d091f9b8a7f74a22bbe"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "a26a5b866285527030f2e3a509378480"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "4c117ae24e0a8f9a36a7ceadddbc3805"}, @NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "045b62ee763b8b27125955983ca67623f1b9f52bf00326bcfd1c666cadad87ed"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "6fa6ca50c0fdedf49f93aa2ec7e137a9"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "501a2b54317bfd9521c6ed47ddd41493"}]}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0xbc}, 0x1, 0x0, 0x0, 0x48000}, 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) 17:11:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0xa000000, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:47 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000400039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:47 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200), 0x0, 0x7}, 0x20) [ 1197.770553][T15474] loop1: detected capacity change from 0 to 256 [ 1197.793923][T15474] EXT4-fs (loop1): fragment/cluster size (16384) != block size (1024) [ 1197.801011][T15475] tmpfs: Unknown parameter 'Råtd' 17:11:47 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRESDEC=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) 17:11:47 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0xf000000, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:47 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000600039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:47 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x1100, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) [ 1197.950611][T15498] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1197.955686][T15500] loop1: detected capacity change from 0 to 256 17:11:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x20000000, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:47 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200), 0x0, 0x700}, 0x20) 17:11:47 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="300000003f001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:47 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req={0x1, 0x6, 0x4, 0x3}, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) bind$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x77, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x41}}, 0x14) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYRES32, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRESOCT=r3, @ANYRES64=r0], 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x40) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="68000d2e1760bb36d702a4030b7f518400", @ANYRES16=r2, @ANYRESDEC=r7, @ANYRESDEC=r6, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) [ 1198.002845][T15500] EXT4-fs (loop1): fragment/cluster size (16384) != block size (1024) 17:11:47 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) [ 1198.080605][T15514] tmpfs: Unknown parameter 'Råtd' 17:11:47 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x60000000, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:48 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200), 0x0, 0x1000000}, 0x20) 17:11:48 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000020039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:48 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x1200, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:48 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000080)={'wpan1\x00'}) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000040)={'wpan0\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="f85822f35941f851000000002c0001802000038006010000000000000800"], 0x68}, 0x1, 0x0, 0x0, 0x4000881}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) sendmsg$NL802154_CMD_SET_PAN_ID(r5, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r6, 0x400, 0x70bd29, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x34}, 0x1, 0x0, 0x0, 0x8018}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) 17:11:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x9effffff, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1198.183144][T15535] loop1: detected capacity change from 0 to 256 17:11:48 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200), 0x0, 0x2000000}, 0x20) 17:11:48 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000030039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) [ 1198.233278][T15535] EXT4-fs (loop1): fragment/cluster size (16384) != block size (1024) [ 1198.259903][T15543] tmpfs: Unknown parameter 'Råtd' 17:11:48 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x1800, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) [ 1198.277786][T15546] netlink: 76 bytes leftover after parsing attributes in process `syz-executor.2'. 17:11:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0xefffffff, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:48 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:48 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r1, @ANYRES64=r2], 0x68}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) 17:11:48 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200), 0x0, 0x7000000}, 0x20) 17:11:48 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000040039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0xf0ffffff, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1198.391588][T15562] tmpfs: Unknown parameter 'Råtd' [ 1198.409753][T15564] loop1: detected capacity change from 0 to 256 17:11:48 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x2000, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) [ 1198.447699][T15564] EXT4-fs (loop1): fragment/cluster size (16384) != block size (1024) 17:11:48 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r7, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) r9 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000140), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r8, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40100000}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)={0x1fc, r9, 0x300, 0x70bd28, 0x25dfdbff, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x124, 0xc, 0x0, 0x1, [{0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xde5a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x29ce45b7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf21}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x63edc08f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7b1cb705}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x68516c55}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5c65}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8533}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x47d181ed}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x28e45992}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x54e9f23e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30b9672}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7761bd60}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf78a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x133feeb8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x64ed8187}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x692088aa}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb38c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x343}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x613d7863}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe51f}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x75880931}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1c7f6e4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8602}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x61fc7399}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x30055961}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x25a4a969}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8108}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3b67}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2135}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x192b1380}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5e213f5e}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xac, 0xc, 0x0, 0x1, [{0x4c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x27a0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1124}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x52d0aad3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x480ddfdb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5a968398}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x559567c9}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf53d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x75fe109e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3085ab85}]}, {0x4c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x684f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5231ce5b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbfd9}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2b52}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x713df5f3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3185}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc492}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xeaaab5e}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x68c1c202}]}, {0x4}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4fa}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}]}, 0x1fc}, 0x1, 0x0, 0x0, 0x20004000}, 0x80) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) 17:11:48 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000070039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:48 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200), 0x0, 0x100000000000000}, 0x20) 17:11:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0xf81d0000, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:48 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:48 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000080039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0xfcffffff, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1198.600832][T15586] tmpfs: Unknown parameter 'Råtd' [ 1198.603317][T15589] validate_nla: 5 callbacks suppressed [ 1198.603332][T15589] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 1198.633662][T15598] loop1: detected capacity change from 0 to 256 17:11:48 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200), 0x0, 0x200000000000000}, 0x20) 17:11:48 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x2500, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) [ 1198.649118][T15589] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1198.669942][T15598] EXT4-fs (loop1): fragment/cluster size (16384) != block size (1024) 17:11:48 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000040), &(0x7f0000000140)=0x4) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) 17:11:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0xffffff7f, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:48 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:48 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000090039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:48 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200), 0x0, 0x700000000000000}, 0x20) 17:11:48 executing program 2: ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r2, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) close(0xffffffffffffffff) bind$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000000, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240), 0xc, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="60000000430004002cbd7000fddbdf2507000000080004000008000008000400030000000a0001007770616e31000000300006800c000c00ff030000000000000c000f0000000100000000000c0007009af2ffffffffffff0700000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x800}, 0x80000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) r5 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000140), r4) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="1c200004361214bee2a285bc33e9f22eeede6e0479e1af0ed0b78dff408590ad934d3181a8450c007dc3e38bcfa82973d52c74a5cc1f043ffbd08e57edb7e08cece384e2ed2c1f1d6c449fea037d32eac03f8f65856b06007c6d9568be0c7fdfe09c09d0dc7182bad031050defcc2c9f6f43a03408b95668a013f7c7bcd2cd6999ced7", @ANYRES16=r5, @ANYBLOB="01000200000000005c000000000000000e808c42"], 0x1c}, 0x1, 0x0, 0x0, 0x20000800}, 0x40) [ 1198.792296][T15614] tmpfs: Unknown parameter 'Råtd' [ 1198.806434][T15618] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1198.819872][T15620] loop1: detected capacity change from 0 to 256 17:11:48 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x3f00, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:48 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="30000b0039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:48 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20000060) 17:11:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0xffffff9e, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1198.873493][T15620] EXT4-fs (loop1): fragment/cluster size (16384) != block size (1024) 17:11:48 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="03000005000000000065352d0eaf1630838f21329e1844622eac64513781243f2336d2455070fc692a1ac6c4653a459e428e49a7101a194e284bab7636b7b5557ebc60f0b0fa54bfd19c00c467cfa543638de201938f3aa46e0549a1fb15137868b59e446f21e1f3d2f1c53fe01c3380e051770bc40d57c1aef93da2fdf072c135f78213f736ac4a6a474f91820d213d787b1203dc00a2bfdc45d7e6142706f77f53e11e25755d9bf090789d0f043ab89ba4d279105b3c1612b13e846a312cf4d8def6f90cec4ac7f9843ff878cce8b57d1f09c16278dcfb3d851fd426963f729eb9ed99c195404d4078881628d7d8939ed0a3ae322ff9fc1acf1342291c3ba6ad62e503b106d8939a66165c099edbbb59f2db5889c96797e0b6fe42cf4c5118a5", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:48 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="30000f0039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) [ 1198.930404][T15631] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1198.955440][T15636] tmpfs: Unknown parameter 'Råtd' 17:11:48 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYRESDEC=r4, @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) 17:11:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0xffffffef, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:48 executing program 0: r0 = accept4$ax25(0xffffffffffffffff, &(0x7f00000001c0)={{0x3, @rose}, [@netrom, @netrom, @netrom, @default, @bcast, @remote, @rose]}, &(0x7f0000000240)=0x48, 0x180000) sendmmsg(r0, &(0x7f00000005c0)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000280)="1422ecced7257356a28b8276bcc90c542eb3f3f12ef0de5557d336928026c1fe87726c3ff192a016db00bc0eb647f4c8a10d32cf187fbb38e5f691939c85979a7094e16b370519abd3ee6935a352a29ca0fbad34514d11d5eed9fab7303afe9eeba19e220686eb0af1097abc5a9d05c898046ba4de94757b7afd6b624d272d2cc82111cbd93f21b4f6a70cd5cf17f0fbe56e1a", 0x93}, {&(0x7f0000000340)="7c57bb5104aca7c853b7ccf3da367ff2c712e13aee51547adcb233401286456aceee1fc9d1ee26bd1d266d94a3130a2c68057b2a636775159e8e0363231618eff1e9d8f83846139a8e6498b3a1e5134a0ea08567e2813ab92c8e56e8f5674fc5de95af01784c7ea4af43c2ec0e4421a0d154cc403d2f5b662af006cc793b5ef9e10a69932a42e3afbbf98b33ed9cf307e2327733204e4301cf03b8509c83b51e28903e2ce1a2650660c70bd2d49ea93fbd0a56cd7e684711efb7050ab32ab39829f5e165", 0xc4}, {&(0x7f0000000440)="b1d95413dad14731fc577745f8a62c", 0xf}, {&(0x7f0000000600)="ecebbee4d172b6a118d6e9762ba61724e54f8fd69f974f9f20e26a1069d9198c43ca3ef08644f59fcf87e78379cfda09a9d1de368109334508209d4a413048b7c3e9a84b1c2f28174869a6bffd1a326ae16cb3f463a49dcc5dd43b2bdcb455764b0a418663d248bde6738c1575434a6018808cc9950fe653d4dca75914c2d8d169f97345e203293dfdaee9658c2603a33b3c4e085c5dd28337ad5a370e4f3f04a636a68bdebdc0e86444bbc46704c23eec3ffa0dc033635700c368de71059e345f06d385a4bba36aaabf3e564719902c0003", 0xd2}], 0x4, &(0x7f0000000740)=[{0x88, 0x111, 0xc, "206b991f49486024dc36913431da040000003ad599fcab09666f09cc3228ec98ed4dd243324fb01a2dcbf76db0eabc87e087f7d234f3710aab66f013fd76cc64159e75ce750cad1754505424d40c781c60aed241a504d9f2d88a50f0db6cfa0af1b8d6f8c7669d5c818cc9e2f83c84a1ee"}, {0x90, 0x112, 0x1, "b3511d57628ee61b610ac52eb92de4d3f1c0be3d907e6d10eb11dbd44b7af1896672f8cd64e3f2ce60db7bc437db94db92401e15f3ef0e64fda9a5c8ea0fadf72066f683bd5918aa369503c160f7f3e39ed0799e4893efee842ad467d8c24ff34147f8045e1fb9ff4a47c2bb84a30d4852b61faf63c78dc62226cb4d2b3100"}], 0x118}}], 0x1, 0x10000800) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x9, 0x8, 0x4}, 0x40) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000100), &(0x7f0000000000)=@udp=r2}, 0x20) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f0000000180)={0x1, 0x0, &(0x7f0000000140)=[0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x5) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r3, &(0x7f0000000100), &(0x7f0000000000)=@udp=r4}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r3, &(0x7f0000000200)}, 0x20) 17:11:48 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x4000, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0xfffffff0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1199.062782][T15651] loop1: detected capacity change from 0 to 256 [ 1199.082876][T15651] EXT4-fs (loop1): fragment/cluster size (16384) != block size (1024) 17:11:49 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="03000005000000000065352d0eaf1630838f21329e1844622eac64513781243f2336d2455070fc692a1ac6c4653a459e428e49a7101a194e284bab7636b7b5557ebc60f0b0fa54bfd19c00c467cfa543638de201938f3aa46e0549a1fb15137868b59e446f21e1f3d2f1c53fe01c3380e051770bc40d57c1aef93da2fdf072c135f78213f736ac4a6a474f91820d213d787b1203dc00a2bfdc45d7e6142706f77f53e11e25755d9bf090789d0f043ab89ba4d279105b3c1612b13e846a312cf4d8def6f90cec4ac7f9843ff878cce8b57d1f09c16278dcfb3d851fd426963f729eb9ed99c195404d4078881628d7d8939ed0a3ae322ff9fc1acf1342291c3ba6ad62e503b106d8939a66165c099edbbb59f2db5889c96797e0b6fe42cf4c5118a5", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:49 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000600039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:49 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x0, 0x5, 0x8, 0x8, 0x153c, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x40000}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) 17:11:49 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) [ 1199.176513][T15661] tmpfs: Unknown parameter 'Råtd' 17:11:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0xfffffffc, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:49 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x4500, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:49 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000339001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) [ 1199.228321][T15675] loop1: detected capacity change from 0 to 256 17:11:49 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) pipe(&(0x7f0000000e80)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r6, &(0x7f0000000380)=[{&(0x7f0000000ec0)="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", 0x1000}, {&(0x7f0000001ec0)='h', 0x1}], 0x2, 0x0) close(r6) bind$inet(r6, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r6, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) splice(r5, 0x0, r6, 0x0, 0x80000000, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r6, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000", @ANYRES16=0x0, @ANYBLOB="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"], 0x94}, 0x1, 0x0, 0x0, 0x4004010}, 0x20001001) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) [ 1199.278447][T15675] EXT4-fs (loop1): fragment/cluster size (16384) != block size (1024) 17:11:49 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:49 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) connect$tipc(r0, &(0x7f0000000040)=@id={0x1e, 0x3, 0x0, {0x4e23, 0x7}}, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) 17:11:49 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000739001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) [ 1199.380545][T15690] tmpfs: Unknown parameter 'Råtd' 17:11:49 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x4700, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x2, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:49 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendfile(r0, r1, 0x0, 0x9) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000180)=r2) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000080)={'wpan1\x00'}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), r4) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r4, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r5, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0xffff}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x24000090) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) [ 1199.434414][T15694] loop1: detected capacity change from 0 to 256 [ 1199.472148][T15694] EXT4-fs (loop1): fragment/cluster size (16384) != block size (1024) 17:11:49 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000939001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) [ 1199.534992][T15706] tmpfs: Unknown parameter 'Råtd' 17:11:49 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x3, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:49 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x4b00, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:49 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000180)={'wpan1\x00', 0x0}) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r6, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="0d0400000000000000001700000008000300", @ANYRES32=r8, @ANYBLOB="4c00258005000200000000002c00018020000380060001000000000008000200030000000c000400000000ebffffffff0700010000000000140004"], 0x68}}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r2, 0x20, 0x70bd26, 0x25dfdbfc, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x440}, 0x20048050) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) 17:11:49 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000280)={'batadv_slave_0\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={r0, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001380), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000400)=0x1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000001dc0)={0x9, 0x5, 0x0, &(0x7f0000001680)='GPL\x00', 0x0, 0x68, &(0x7f0000001280)=""/104, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001d40)={0x0, 0x3}, 0x8, 0x10, 0x0, 0x0, r3}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x13, 0x1, &(0x7f0000000140)=@raw=[@jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0xffffffffffffffd8}], &(0x7f0000000180)='syzkaller\x00', 0x88, 0x8b, &(0x7f00000001c0)=""/139, 0x41000, 0x13, '\x00', r2, 0x10, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x5, 0x6, 0x3, 0x1f}, 0x10, r3}, 0x78) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) 17:11:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x4, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:49 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000b39001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) [ 1199.687374][T15720] loop1: detected capacity change from 0 to 256 [ 1199.713885][T15723] tmpfs: Unknown parameter 'Råtd' [ 1199.721467][T15720] EXT4-fs (loop1): fragment/cluster size (16384) != block size (1024) 17:11:49 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000f39001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) 17:11:49 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x4d00, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) [ 1199.735683][T15728] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 17:11:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x5, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:49 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:49 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = syz_open_dev$mouse(&(0x7f0000000140), 0x883, 0x400000) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180), 0x22040, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000380)=0x14, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0xe, &(0x7f00000001c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0xffff0001, 0x0, 0x0, 0x0, 0x7}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0x7f}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x2}, @map_val={0x18, 0x2, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0xf06}, @map={0x18, 0xa, 0x1, 0x0, r2}, @ldst={0x0, 0x1, 0x0, 0xa, 0x3, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xd}], &(0x7f0000000240)='syzkaller\x00', 0x3, 0xa9, &(0x7f0000000280)=""/169, 0x41000, 0x18, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x5, 0xc, 0x9, 0x5}, 0x10}, 0x78) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r4}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) 17:11:49 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000004039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) [ 1199.877187][T15745] tmpfs: Unknown parameter 'Råtd' 17:11:49 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x5000, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:49 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x9, 0x8, 0x4}, 0x40) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r2, &(0x7f0000000100), &(0x7f0000000000)=@udp=r4}, 0x20) bind$inet(r3, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000480)={r2, &(0x7f0000000340), &(0x7f0000000440)=@udp=r3}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000100)={r2, &(0x7f0000000380)='Z', &(0x7f00000001c0)=@udp}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r2}, 0x10) 17:11:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x6, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:49 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000006039001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) [ 1199.917349][T15750] loop1: detected capacity change from 0 to 256 [ 1199.951927][T15750] EXT4-fs (loop1): fragment/cluster size (16384) != block size (1024) [ 1200.010106][T15757] tmpfs: Unknown parameter 'Råtd' 17:11:49 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x38}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0d0400000000fdffffff1600000008000300", @ANYRES32=r3, @ANYBLOB="4c00258005000200000000002c0001802000038006000100000000000800"], 0x68}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_KEY(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000080), r5) sendmsg$NLBL_CIPSOV4_C_ADD(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x40, r7, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSLVLLST={0x18, 0x8, 0x0, 0x1, [{0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x15407aaf}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8}]}]}]}, 0x40}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000003c0)={0x98, r7, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0xdf6ae584b7e0156b}, {0x5, 0x3, 0x5}, {0x5}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}, @NLBL_CIPSOV4_A_TAGLST={0x54, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5, 0x3, 0x2}, {0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x6}, {0x5}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x1}, 0x4044) 17:11:49 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000140)) 17:11:49 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x7, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:49 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:49 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x5400, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:50 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000239001900fffffc0100000000020080000400000018"], 0x30}}, 0x0) [ 1200.147903][T15773] ------------[ cut here ]------------ [ 1200.160156][T15777] loop1: detected capacity change from 0 to 256 [ 1200.171196][T15773] WARNING: CPU: 1 PID: 15773 at mm/page_alloc.c:5365 __alloc_pages+0x588/0x5f0 17:11:50 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x8, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) 17:11:50 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000140), 0x7, 0x200) getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000180)={@remote, @broadcast, 0x0}, &(0x7f00000001c0)=0xc) bind$packet(r2, &(0x7f0000000200)={0x11, 0x16, r3, 0x1, 0xff, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x10}}, 0x14) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r0, 0x942e, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) [ 1200.195895][T15777] EXT4-fs (loop1): fragment/cluster size (16384) != block size (1024) [ 1200.211339][T15773] Modules linked in: [ 1200.220720][T15784] tmpfs: Unknown parameter 'Råtd' [ 1200.232850][T15773] CPU: 1 PID: 15773 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 17:11:50 executing program 5: syz_mount_image$tmpfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x5c00, 0x0, 0x0, 0x2020, &(0x7f0000000100)={[{@nr_blocks={'nr_blocks', 0x3d, [0x34]}}]}) 17:11:50 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000016c0)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x9, {}, [@IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}}, 0x0) [ 1200.246736][T15773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1200.263361][T15773] RIP: 0010:__alloc_pages+0x588/0x5f0 [ 1200.272362][T15773] Code: 00 48 ba 00 00 00 00 00 fc ff df e9 5e fd ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 6d fd ff ff e8 8d 62 0a 00 e9 63 fd ff ff <0f> 0b 45 31 e4 e9 7a fd ff ff 48 8d 4c 24 50 80 e1 07 80 c1 03 38 17:11:50 executing program 1: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000380)="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", 0x121, 0x8}, {0x0, 0x0, 0x10001}], 0x81, &(0x7f0000000000)) 17:11:50 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x12, 0x5, 0x8, 0x4}, 0x40) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000100), &(0x7f0000000000)=@udp=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000200)}, 0x20) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000140)=0x7, 0x4) [ 1200.345603][T15798] tmpfs: Unknown parameter 'Råtd' [ 1200.372671][T15803] loop1: detected capacity change from 0 to 256 [ 1200.385306][T15773] RSP: 0018:ffffc90002e2f1a0 EFLAGS: 00010246 [ 1200.389472][T15803] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 1200.401768][T15773] RAX: dffffc0000000000 RBX: 0000000000000013 RCX: 0000000000000000 [ 1200.411612][T15773] RDX: 0000000000000028 RSI: 0000000000000000 RDI: ffffc90002e2f228 [ 1200.421605][T15773] RBP: ffffc90002e2f2b0 R08: dffffc0000000000 R09: ffffc90002e2f200 [ 1200.430662][T15773] R10: fffff520005c5e45 R11: 0000000000000000 R12: 0000000000040dc0 [ 1200.440882][T15773] R13: ffffc90002e2f200 R14: 1ffff920005c5e3c R15: 1ffff920005c5e38 [ 1200.461720][T15773] FS: 00007fd51aa7b700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 1200.471448][T15773] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1200.480208][T15773] CR2: 0000000000568000 CR3: 0000000027a46000 CR4: 00000000001526e0 [ 1200.488947][T15773] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1200.497851][T15773] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1200.507065][T15773] Call Trace: [ 1200.510404][T15773] ? __rmqueue_pcplist+0x2030/0x2030 [ 1200.516759][T15773] ? __nla_validate_parse+0x1b3c/0x24f0 [ 1200.522871][T15773] ? alloc_pages+0x3f3/0x500 [ 1200.528668][T15773] kmalloc_order+0x41/0x170 [ 1200.533232][T15773] kmalloc_order_trace+0x15/0x70 [ 1200.539274][T15773] __kmalloc+0x292/0x390 [ 1200.544797][T15773] kcalloc+0x2b/0x40 [ 1200.548827][T15773] netlbl_cipsov4_add+0x1630/0x31a0 [ 1200.555170][T15773] ? asan.module_dtor+0x20/0x20 [ 1200.568554][T15773] ? genl_family_rcv_msg_attrs_parse+0x1cd/0x290 [ 1200.576421][T15773] genl_rcv_msg+0xfb4/0x13c0 [ 1200.581129][T15773] ? genl_bind+0x360/0x360 [ 1200.596337][T15773] ? unwind_get_return_address+0x48/0x80 [ 1200.610207][T15773] ? arch_stack_walk+0x98/0xe0 [ 1200.622514][T15773] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1200.631446][T15773] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1200.643505][T15773] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1200.652112][T15773] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1200.667059][T15773] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1200.686866][T15773] ? rcu_lock_acquire+0x5/0x30 [ 1200.691856][T15773] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1200.715469][T15773] ? asan.module_dtor+0x20/0x20 [ 1200.729230][T15773] ? trace_lock_acquire+0x59/0x190 [ 1200.734710][T15773] netlink_rcv_skb+0x1f0/0x460 [ 1200.749650][T15773] ? genl_bind+0x360/0x360 [ 1200.759597][T15773] ? netlink_ack+0xb70/0xb70 [ 1200.766862][T15773] ? __down_read_common+0x1b0/0x450 [ 1200.794103][T15773] ? up_read_non_owner+0x1c0/0x1c0 [ 1200.808466][T15773] ? netlink_deliver_tap+0x130/0x840 [ 1200.827892][T15773] genl_rcv+0x24/0x40 [ 1200.841845][T15773] netlink_unicast+0x7de/0x9b0 [ 1200.853587][T15773] ? netlink_detachskb+0xa0/0xa0 [ 1200.860315][T15773] ? __virt_addr_valid+0x21b/0x2d0 [ 1200.878403][T15773] ? __phys_addr_symbol+0x2b/0x70 [ 1200.894510][T15773] ? __check_object_size+0x2f3/0x3f0 [ 1200.912556][T15773] ? bpf_lsm_netlink_send+0x5/0x10 [ 1200.925406][T15773] netlink_sendmsg+0x9e7/0xe00 [ 1200.947069][T15773] ? netlink_getsockopt+0xa60/0xa60 [ 1200.952972][T15773] ? iovec_from_user+0x359/0x390 [ 1200.967502][T15773] ? __import_iovec+0x35f/0x500 [ 1200.981983][T15773] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1200.989832][T15773] ? security_socket_sendmsg+0x9d/0xb0 [ 1201.005419][T15773] ? netlink_getsockopt+0xa60/0xa60 [ 1201.019292][T15773] ____sys_sendmsg+0x5a2/0x900 [ 1201.032107][T15773] ? __sys_sendmsg_sock+0x30/0x30 [ 1201.040394][T15773] __sys_sendmsg+0x319/0x400 [ 1201.053236][T15773] ? ____sys_sendmsg+0x900/0x900 [ 1201.061086][T15773] ? fput_many+0x42/0x1a0 [ 1201.073440][T15773] ? trace_lock_release+0x4f/0x150 [ 1201.086950][T15773] ? lock_release+0x81/0x7b0 [ 1201.092512][T15773] ? trace_lock_release+0x4f/0x150 [ 1201.105165][T15773] ? read_lock_is_recursive+0x10/0x10 [ 1201.111971][T15773] ? read_lock_is_recursive+0x10/0x10 [ 1201.119000][T15773] ? __lock_acquire+0x6100/0x6100 [ 1201.126494][T15773] ? __lock_acquire+0x6100/0x6100 [ 1201.131700][T15773] ? account_other_time+0x63/0x280 [ 1201.138826][T15773] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1201.146956][T15773] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1201.153141][T15773] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1201.162136][T15773] do_syscall_64+0x3d/0xb0 [ 1201.167511][T15773] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1201.173632][T15773] RIP: 0033:0x4665f9 [ 1201.178637][T15773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1201.201093][T15773] RSP: 002b:00007fd51aa7b188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1201.210418][T15773] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1201.224883][T15773] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 000000000000000d [ 1201.232941][T15773] RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 [ 1201.243790][T15773] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 1201.252719][T15773] R13: 00007ffe9292d03f R14: 00007fd51aa7b300 R15: 0000000000022000 [ 1201.263567][T15773] Kernel panic - not syncing: panic_on_warn set ... [ 1201.270160][T15773] CPU: 0 PID: 15773 Comm: syz-executor.2 Not tainted 5.14.0-syzkaller #0 [ 1201.278568][T15773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1201.288618][T15773] Call Trace: [ 1201.291899][T15773] dump_stack_lvl+0x1ae/0x29f [ 1201.296583][T15773] ? show_regs_print_info+0x12/0x12 [ 1201.301788][T15773] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 1201.307512][T15773] panic+0x2e1/0x850 [ 1201.311408][T15773] ? __kernel_text_address+0x93/0x100 [ 1201.316849][T15773] ? __warn+0x13e/0x270 [ 1201.320991][T15773] ? nmi_panic+0x90/0x90 [ 1201.325232][T15773] __warn+0x26a/0x270 [ 1201.329221][T15773] ? __alloc_pages+0x588/0x5f0 [ 1201.333970][T15773] ? __alloc_pages+0x588/0x5f0 [ 1201.338714][T15773] report_bug+0x1b1/0x2e0 [ 1201.343029][T15773] handle_bug+0x3d/0x70 [ 1201.347168][T15773] exc_invalid_op+0x16/0x40 [ 1201.351652][T15773] asm_exc_invalid_op+0x12/0x20 [ 1201.356485][T15773] RIP: 0010:__alloc_pages+0x588/0x5f0 [ 1201.361850][T15773] Code: 00 48 ba 00 00 00 00 00 fc ff df e9 5e fd ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 6d fd ff ff e8 8d 62 0a 00 e9 63 fd ff ff <0f> 0b 45 31 e4 e9 7a fd ff ff 48 8d 4c 24 50 80 e1 07 80 c1 03 38 [ 1201.381440][T15773] RSP: 0018:ffffc90002e2f1a0 EFLAGS: 00010246 [ 1201.387490][T15773] RAX: dffffc0000000000 RBX: 0000000000000013 RCX: 0000000000000000 [ 1201.395444][T15773] RDX: 0000000000000028 RSI: 0000000000000000 RDI: ffffc90002e2f228 [ 1201.403395][T15773] RBP: ffffc90002e2f2b0 R08: dffffc0000000000 R09: ffffc90002e2f200 [ 1201.411348][T15773] R10: fffff520005c5e45 R11: 0000000000000000 R12: 0000000000040dc0 [ 1201.419300][T15773] R13: ffffc90002e2f200 R14: 1ffff920005c5e3c R15: 1ffff920005c5e38 [ 1201.427264][T15773] ? __rmqueue_pcplist+0x2030/0x2030 [ 1201.432532][T15773] ? __nla_validate_parse+0x1b3c/0x24f0 [ 1201.438069][T15773] ? alloc_pages+0x3f3/0x500 [ 1201.442647][T15773] kmalloc_order+0x41/0x170 [ 1201.447133][T15773] kmalloc_order_trace+0x15/0x70 [ 1201.452052][T15773] __kmalloc+0x292/0x390 [ 1201.456281][T15773] kcalloc+0x2b/0x40 [ 1201.460158][T15773] netlbl_cipsov4_add+0x1630/0x31a0 [ 1201.465342][T15773] ? asan.module_dtor+0x20/0x20 [ 1201.470177][T15773] ? genl_family_rcv_msg_attrs_parse+0x1cd/0x290 [ 1201.476489][T15773] genl_rcv_msg+0xfb4/0x13c0 [ 1201.481238][T15773] ? genl_bind+0x360/0x360 [ 1201.485631][T15773] ? unwind_get_return_address+0x48/0x80 [ 1201.491253][T15773] ? arch_stack_walk+0x98/0xe0 [ 1201.496010][T15773] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1201.501636][T15773] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1201.507606][T15773] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1201.513394][T15773] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 1201.519352][T15773] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1201.524979][T15773] ? rcu_lock_acquire+0x5/0x30 [ 1201.529726][T15773] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1201.535338][T15773] ? asan.module_dtor+0x20/0x20 [ 1201.540169][T15773] ? trace_lock_acquire+0x59/0x190 [ 1201.545263][T15773] netlink_rcv_skb+0x1f0/0x460 [ 1201.550011][T15773] ? genl_bind+0x360/0x360 [ 1201.554406][T15773] ? netlink_ack+0xb70/0xb70 [ 1201.558977][T15773] ? __down_read_common+0x1b0/0x450 [ 1201.564158][T15773] ? up_read_non_owner+0x1c0/0x1c0 [ 1201.569262][T15773] ? netlink_deliver_tap+0x130/0x840 [ 1201.574620][T15773] genl_rcv+0x24/0x40 [ 1201.578588][T15773] netlink_unicast+0x7de/0x9b0 [ 1201.583352][T15773] ? netlink_detachskb+0xa0/0xa0 [ 1201.588270][T15773] ? __virt_addr_valid+0x21b/0x2d0 [ 1201.593366][T15773] ? __phys_addr_symbol+0x2b/0x70 [ 1201.598368][T15773] ? __check_object_size+0x2f3/0x3f0 [ 1201.603634][T15773] ? bpf_lsm_netlink_send+0x5/0x10 [ 1201.608727][T15773] netlink_sendmsg+0x9e7/0xe00 [ 1201.613487][T15773] ? netlink_getsockopt+0xa60/0xa60 [ 1201.618663][T15773] ? iovec_from_user+0x359/0x390 [ 1201.623582][T15773] ? __import_iovec+0x35f/0x500 [ 1201.628411][T15773] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1201.633677][T15773] ? security_socket_sendmsg+0x9d/0xb0 [ 1201.639118][T15773] ? netlink_getsockopt+0xa60/0xa60 [ 1201.644311][T15773] ____sys_sendmsg+0x5a2/0x900 [ 1201.649059][T15773] ? __sys_sendmsg_sock+0x30/0x30 [ 1201.654067][T15773] __sys_sendmsg+0x319/0x400 [ 1201.658639][T15773] ? ____sys_sendmsg+0x900/0x900 [ 1201.663555][T15773] ? fput_many+0x42/0x1a0 [ 1201.667874][T15773] ? trace_lock_release+0x4f/0x150 [ 1201.672965][T15773] ? lock_release+0x81/0x7b0 [ 1201.677537][T15773] ? trace_lock_release+0x4f/0x150 [ 1201.682633][T15773] ? read_lock_is_recursive+0x10/0x10 [ 1201.687985][T15773] ? read_lock_is_recursive+0x10/0x10 [ 1201.693347][T15773] ? __lock_acquire+0x6100/0x6100 [ 1201.698353][T15773] ? __lock_acquire+0x6100/0x6100 [ 1201.703358][T15773] ? account_other_time+0x63/0x280 [ 1201.708456][T15773] ? rcu_read_lock_sched_held+0x5d/0x110 [ 1201.714072][T15773] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1201.720132][T15773] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 1201.726202][T15773] do_syscall_64+0x3d/0xb0 [ 1201.730609][T15773] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1201.736485][T15773] RIP: 0033:0x4665f9 [ 1201.740361][T15773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1201.759944][T15773] RSP: 002b:00007fd51aa7b188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1201.768347][T15773] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 1201.776309][T15773] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 000000000000000d [ 1201.784262][T15773] RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 [ 1201.792212][T15773] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 1201.800165][T15773] R13: 00007ffe9292d03f R14: 00007fd51aa7b300 R15: 0000000000022000 [ 1201.809283][T15773] Kernel Offset: disabled [ 1201.813590][T15773] Rebooting in 86400 seconds..