Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000500)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2XzJs\xd1\xaa\x8f\x83\x91\x17\x9a\xdf:\x99\'\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x0) 17:41:58 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x1, 0x0) 17:41:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() [ 1260.912984][T14576] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:41:58 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x1, 0x0) 17:41:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) munlockall() 17:41:58 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188", 0x7, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) [ 1261.309909][T14592] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:41:58 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x1, 0x0) [ 1261.794090][T14602] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:41:59 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x1, 0x0) [ 1262.079901][T14607] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:41:59 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x1, 0x0) 17:41:59 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188", 0x7, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) [ 1262.411867][T14612] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:42:00 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c"], 0xb4}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:00 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x1, 0x0) 17:42:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:00 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3", 0x8, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x0) [ 1263.765820][T14626] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1263.770736][T14635] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1263.846290][T14626] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1263.892036][T14626] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock 17:42:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 1263.945241][T14626] EXT4-fs error (device loop1): ext4_fill_super:4466: inode #2: comm syz-executor.1: iget: bogus i_mode (53177) 17:42:01 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x1, 0x0) [ 1264.001867][T14626] EXT4-fs (loop1): get root inode failed [ 1264.031669][T14626] EXT4-fs (loop1): mount failed 17:42:01 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c"], 0xb4}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) [ 1264.208318][T14655] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:42:01 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x1, 0x0) [ 1264.536268][T14666] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:42:01 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3", 0x8, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) [ 1264.654884][T14663] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 17:42:02 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001", 0x1d, 0x400}], 0x1, 0x0) 17:42:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() [ 1264.752123][T14663] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1264.791676][T14663] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1264.860332][T14663] EXT4-fs error (device loop1): ext4_fill_super:4466: inode #2: comm syz-executor.1: iget: bogus i_mode (53177) [ 1264.910503][T14678] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1265.039742][T14663] EXT4-fs (loop1): get root inode failed [ 1265.067858][T14663] EXT4-fs (loop1): mount failed 17:42:02 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:02 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001", 0x1d, 0x400}], 0x1, 0x0) 17:42:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:02 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c"], 0xb4}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) [ 1265.281490][T14689] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:42:02 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001", 0x1d, 0x400}], 0x1, 0x0) [ 1265.572116][T14700] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 17:42:02 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3", 0x8, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) [ 1265.633486][T14706] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1265.661591][T14700] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 17:42:03 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000", 0x2c, 0x400}], 0x1, 0x0) [ 1265.760508][T14700] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1265.841611][T14700] EXT4-fs error (device loop1): ext4_fill_super:4466: inode #2: comm syz-executor.1: iget: bogus i_mode (53177) [ 1265.885881][T14714] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 1265.936007][T14700] EXT4-fs (loop1): get root inode failed [ 1265.964826][T14700] EXT4-fs (loop1): mount failed 17:42:03 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000", 0x2c, 0x400}], 0x1, 0x0) 17:42:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, 0x0, 0x0) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 1266.246594][T14721] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:42:03 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:03 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000", 0x2c, 0x400}], 0x1, 0x0) [ 1266.540665][T14733] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:42:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:04 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(0xffffffffffffffff, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, 0x0, 0x0) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:04 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe", 0x33, 0x400}], 0x1, 0x0) 17:42:04 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:04 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(0xffffffffffffffff, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) [ 1267.204701][T14754] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:42:04 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe", 0x33, 0x400}], 0x1, 0x0) 17:42:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:04 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(0xffffffffffffffff, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() [ 1267.496420][T14763] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:42:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:05 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe", 0x33, 0x400}], 0x1, 0x0) 17:42:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:05 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) [ 1268.538509][T14786] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:42:05 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ff", 0x37, 0x400}], 0x1, 0x0) 17:42:06 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) [ 1268.788328][T14793] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:42:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:06 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ff", 0x37, 0x400}], 0x1, 0x0) 17:42:06 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) [ 1269.116892][T14803] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:42:06 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ff", 0x37, 0x400}], 0x1, 0x0) 17:42:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() [ 1269.432112][T14814] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:42:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:07 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53", 0x39, 0x400}], 0x1, 0x0) 17:42:07 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:07 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 1270.257332][T14827] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:42:07 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53", 0x39, 0x400}], 0x1, 0x0) [ 1270.495198][T14840] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:42:07 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53", 0x39, 0x400}], 0x1, 0x0) 17:42:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 1270.707541][T14846] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:42:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:08 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a}], 0x1, 0x0) 17:42:08 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) [ 1270.967549][T14859] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:42:08 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a}], 0x1, 0x0) [ 1271.143589][T14867] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:42:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:08 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a}], 0x1, 0x0) 17:42:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() [ 1271.686817][T14878] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 17:42:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:09 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 17:42:09 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) [ 1272.056941][T14892] EXT4-fs (loop5): bad geometry: block count 1080 exceeds size of device (1 blocks) 17:42:09 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) [ 1272.299759][T14903] EXT4-fs (loop5): bad geometry: block count 1080 exceeds size of device (1 blocks) 17:42:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:10 executing program 5: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 17:42:10 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) [ 1272.859317][T14913] EXT4-fs (loop5): bad geometry: block count 1080 exceeds size of device (1 blocks) 17:42:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x0) 17:42:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x0) 17:42:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:11 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(0xffffffffffffffff, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, 0x0, 0x0) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:12 executing program 1: syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r0, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:12 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, 0x0, 0x0) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:12 executing program 1: syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r0, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:12 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:13 executing program 2: r0 = syz_open_procfs(0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:13 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:13 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:14 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:14 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:15 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) 17:42:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:15 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:15 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) 17:42:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) 17:42:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:17 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:17 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:17 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:18 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:42:19 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:19 executing program 1 (fault-call:1 fault-nth:1): sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) [ 1282.568755][T15180] FAULT_INJECTION: forcing a failure. [ 1282.568755][T15180] name failslab, interval 1, probability 0, space 0, times 0 [ 1282.671257][T15180] CPU: 1 PID: 15180 Comm: syz-executor.1 Not tainted 5.3.0-rc3-next-20190806 #60 [ 1282.680435][T15180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1282.690524][T15180] Call Trace: [ 1282.693835][T15180] dump_stack+0x172/0x1f0 [ 1282.698209][T15180] should_fail.cold+0xa/0x15 [ 1282.702838][T15180] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1282.709018][T15180] ? fault_create_debugfs_attr+0x180/0x180 [ 1282.715022][T15180] ? page_to_nid.part.0+0x20/0x20 [ 1282.720090][T15180] ? ___might_sleep+0x163/0x280 [ 1282.724982][T15180] __should_failslab+0x121/0x190 [ 1282.729939][T15180] ? shmem_destroy_inode+0x80/0x80 [ 1282.735077][T15180] should_failslab+0x9/0x14 [ 1282.739602][T15180] kmem_cache_alloc+0x2aa/0x710 [ 1282.744472][T15180] ? __alloc_fd+0x487/0x620 [ 1282.748998][T15180] ? __kasan_check_read+0x11/0x20 [ 1282.754153][T15180] ? shmem_destroy_inode+0x80/0x80 [ 1282.759372][T15180] shmem_alloc_inode+0x1c/0x50 [ 1282.764161][T15180] alloc_inode+0x68/0x1e0 [ 1282.768606][T15180] new_inode_pseudo+0x19/0xf0 [ 1282.773309][T15180] new_inode+0x1f/0x40 [ 1282.777486][T15180] shmem_get_inode+0x84/0x7e0 [ 1282.782180][T15180] __shmem_file_setup.part.0+0x7e/0x2b0 [ 1282.787837][T15180] shmem_file_setup+0x66/0x90 [ 1282.792542][T15180] __x64_sys_memfd_create+0x2a2/0x470 [ 1282.797946][T15180] ? memfd_fcntl+0x1580/0x1580 [ 1282.802917][T15180] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1282.809020][T15180] ? trace_hardirqs_off_caller+0x65/0x230 [ 1282.814769][T15180] ? trace_hardirqs_on+0x67/0x240 [ 1282.819823][T15180] do_syscall_64+0xfa/0x760 [ 1282.824373][T15180] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1282.830283][T15180] RIP: 0033:0x459829 [ 1282.834189][T15180] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1282.853831][T15180] RSP: 002b:00007f22b6ee3a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1282.862268][T15180] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459829 [ 1282.870253][T15180] RDX: 0000000020018110 RSI: 0000000000000000 RDI: 00000000004be748 [ 1282.878240][T15180] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1282.886227][T15180] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f22b6ee46d4 [ 1282.894236][T15180] R13: 00000000004c8968 R14: 00000000004df780 R15: 0000000000000003 17:42:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:20 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, 0x0, 0x0, 0x0) 17:42:20 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:20 executing program 1 (fault-call:1 fault-nth:2): sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() [ 1283.176170][T15195] FAULT_INJECTION: forcing a failure. [ 1283.176170][T15195] name failslab, interval 1, probability 0, space 0, times 0 17:42:20 executing program 3: syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r0 = syz_open_procfs(0x0, 0x0) lseek(r0, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 1283.255267][T15195] CPU: 0 PID: 15195 Comm: syz-executor.1 Not tainted 5.3.0-rc3-next-20190806 #60 [ 1283.264429][T15195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1283.274500][T15195] Call Trace: [ 1283.277804][T15195] dump_stack+0x172/0x1f0 [ 1283.282151][T15195] should_fail.cold+0xa/0x15 [ 1283.286780][T15195] ? fault_create_debugfs_attr+0x180/0x180 [ 1283.292603][T15195] ? page_to_nid.part.0+0x20/0x20 [ 1283.297645][T15195] ? ___might_sleep+0x163/0x280 [ 1283.302513][T15195] __should_failslab+0x121/0x190 [ 1283.307475][T15195] should_failslab+0x9/0x14 [ 1283.311994][T15195] kmem_cache_alloc+0x2aa/0x710 [ 1283.316861][T15195] ? lock_acquire+0x190/0x410 [ 1283.321554][T15195] ? current_time+0x6b/0x140 [ 1283.326161][T15195] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1283.332416][T15195] ? timespec64_trunc+0xf0/0x180 [ 1283.332430][T15195] __d_alloc+0x2e/0x8c0 [ 1283.332445][T15195] d_alloc_pseudo+0x1e/0x70 [ 1283.332466][T15195] alloc_file_pseudo+0xe2/0x280 [ 1283.332480][T15195] ? alloc_file+0x4d0/0x4d0 [ 1283.332496][T15195] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1283.332519][T15195] __shmem_file_setup.part.0+0x108/0x2b0 [ 1283.341681][T15195] shmem_file_setup+0x66/0x90 [ 1283.341710][T15195] __x64_sys_memfd_create+0x2a2/0x470 [ 1283.377507][T15195] ? memfd_fcntl+0x1580/0x1580 [ 1283.382294][T15195] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1283.388386][T15195] ? trace_hardirqs_off_caller+0x65/0x230 [ 1283.394125][T15195] ? trace_hardirqs_on+0x67/0x240 [ 1283.399160][T15195] do_syscall_64+0xfa/0x760 [ 1283.403682][T15195] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1283.409768][T15195] RIP: 0033:0x459829 [ 1283.413679][T15195] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1283.433382][T15195] RSP: 002b:00007f22b6ee3a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1283.441804][T15195] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459829 [ 1283.449824][T15195] RDX: 0000000020018110 RSI: 0000000000000000 RDI: 00000000004be748 [ 1283.457809][T15195] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1283.465792][T15195] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f22b6ee46d4 [ 1283.473779][T15195] R13: 00000000004c8968 R14: 00000000004df780 R15: 0000000000000003 17:42:20 executing program 3: syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r0 = syz_open_procfs(0x0, 0x0) lseek(r0, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:20 executing program 1 (fault-call:1 fault-nth:3): sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:20 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 1283.704794][T15208] FAULT_INJECTION: forcing a failure. [ 1283.704794][T15208] name failslab, interval 1, probability 0, space 0, times 0 [ 1283.792209][T15208] CPU: 0 PID: 15208 Comm: syz-executor.1 Not tainted 5.3.0-rc3-next-20190806 #60 [ 1283.801385][T15208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1283.811470][T15208] Call Trace: [ 1283.814783][T15208] dump_stack+0x172/0x1f0 [ 1283.819140][T15208] should_fail.cold+0xa/0x15 [ 1283.823751][T15208] ? fault_create_debugfs_attr+0x180/0x180 [ 1283.829584][T15208] ? page_to_nid.part.0+0x20/0x20 [ 1283.834633][T15208] ? ___might_sleep+0x163/0x280 [ 1283.839529][T15208] __should_failslab+0x121/0x190 [ 1283.844499][T15208] should_failslab+0x9/0x14 [ 1283.849016][T15208] kmem_cache_alloc+0x2aa/0x710 [ 1283.853881][T15208] ? lock_acquire+0x190/0x410 [ 1283.858660][T15208] ? current_time+0x6b/0x140 [ 1283.863275][T15208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1283.869530][T15208] ? timespec64_trunc+0xf0/0x180 [ 1283.874491][T15208] __d_alloc+0x2e/0x8c0 [ 1283.878755][T15208] d_alloc_pseudo+0x1e/0x70 [ 1283.883456][T15208] alloc_file_pseudo+0xe2/0x280 [ 1283.888440][T15208] ? alloc_file+0x4d0/0x4d0 [ 1283.892974][T15208] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1283.899237][T15208] __shmem_file_setup.part.0+0x108/0x2b0 [ 1283.904893][T15208] shmem_file_setup+0x66/0x90 [ 1283.909615][T15208] __x64_sys_memfd_create+0x2a2/0x470 [ 1283.915010][T15208] ? memfd_fcntl+0x1580/0x1580 [ 1283.919883][T15208] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1283.925975][T15208] ? trace_hardirqs_off_caller+0x65/0x230 [ 1283.931721][T15208] ? trace_hardirqs_on+0x67/0x240 [ 1283.936792][T15208] do_syscall_64+0xfa/0x760 [ 1283.941319][T15208] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1283.947234][T15208] RIP: 0033:0x459829 [ 1283.951145][T15208] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1283.970763][T15208] RSP: 002b:00007f22b6ee3a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1283.979201][T15208] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459829 17:42:21 executing program 3: syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r0 = syz_open_procfs(0x0, 0x0) lseek(r0, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 1283.987272][T15208] RDX: 0000000020018110 RSI: 0000000000000000 RDI: 00000000004be748 [ 1283.995257][T15208] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1284.003278][T15208] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f22b6ee46d4 [ 1284.011281][T15208] R13: 00000000004c8968 R14: 00000000004df780 R15: 0000000000000003 17:42:21 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, 0x0, 0x0, 0x0) 17:42:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:22 executing program 1 (fault-call:1 fault-nth:4): sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:22 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 1284.903379][T15232] FAULT_INJECTION: forcing a failure. [ 1284.903379][T15232] name failslab, interval 1, probability 0, space 0, times 0 [ 1284.932244][T15232] CPU: 0 PID: 15232 Comm: syz-executor.1 Not tainted 5.3.0-rc3-next-20190806 #60 [ 1284.941551][T15232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1284.951622][T15232] Call Trace: [ 1284.954926][T15232] dump_stack+0x172/0x1f0 [ 1284.959299][T15232] should_fail.cold+0xa/0x15 [ 1284.963907][T15232] ? fault_create_debugfs_attr+0x180/0x180 [ 1284.969848][T15232] ? page_to_nid.part.0+0x20/0x20 [ 1284.974889][T15232] ? ___might_sleep+0x163/0x280 [ 1284.979836][T15232] __should_failslab+0x121/0x190 [ 1284.984968][T15232] should_failslab+0x9/0x14 [ 1284.989496][T15232] kmem_cache_alloc+0x2aa/0x710 [ 1284.994366][T15232] ? memcg_kmem_put_cache+0x3e/0x50 [ 1284.999579][T15232] ? kmem_cache_alloc+0x314/0x710 [ 1285.004622][T15232] security_file_alloc+0x39/0x170 [ 1285.009681][T15232] __alloc_file+0xde/0x340 [ 1285.014111][T15232] alloc_empty_file+0x72/0x170 [ 1285.018904][T15232] alloc_file+0x5e/0x4d0 [ 1285.023163][T15232] alloc_file_pseudo+0x189/0x280 [ 1285.028122][T15232] ? alloc_file+0x4d0/0x4d0 [ 1285.032642][T15232] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 1285.038906][T15232] __shmem_file_setup.part.0+0x108/0x2b0 [ 1285.044565][T15232] shmem_file_setup+0x66/0x90 [ 1285.049255][T15232] __x64_sys_memfd_create+0x2a2/0x470 [ 1285.054726][T15232] ? memfd_fcntl+0x1580/0x1580 [ 1285.054741][T15232] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1285.054755][T15232] ? trace_hardirqs_off_caller+0x65/0x230 [ 1285.054767][T15232] ? trace_hardirqs_on+0x67/0x240 [ 1285.054783][T15232] do_syscall_64+0xfa/0x760 [ 1285.054799][T15232] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1285.054818][T15232] RIP: 0033:0x459829 [ 1285.090758][T15232] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1285.110418][T15232] RSP: 002b:00007f22b6ee3a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 1285.118862][T15232] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 0000000000459829 [ 1285.126843][T15232] RDX: 0000000020018110 RSI: 0000000000000000 RDI: 00000000004be748 [ 1285.134826][T15232] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1285.134833][T15232] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f22b6ee46d4 17:42:22 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 1285.134840][T15232] R13: 00000000004c8968 R14: 00000000004df780 R15: 0000000000000003 17:42:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:22 executing program 1 (fault-call:1 fault-nth:5): sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:22 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1285.802638][T15253] RSP: 002b:00007f22b6ee3a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 1285.811071][T15253] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 00000000004597f7 [ 1285.819065][T15253] RDX: 0000000020018110 RSI: 0000000006c00000 RDI: 0000000000000004 [ 1285.827064][T15253] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 1285.835080][T15253] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 17:42:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:23 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:23 executing program 2 (fault-call:3 fault-nth:0): r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) [ 1285.843071][T15253] R13: 00000000004c8968 R14: 00000000004df780 R15: 0000000000000003 [ 1285.922233][T15253] ERROR: Out of memory at tomoyo_realpath_from_path. 17:42:23 executing program 3: r0 = syz_open_procfs(0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:23 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:23 executing program 3: syz_open_procfs(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 1286.320678][T15253] EXT4-fs: failed to create workqueue [ 1286.351755][T15253] EXT4-fs (loop1): mount failed 17:42:23 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:23 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:23 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x2, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) [ 1286.772996][T15299] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1286.837239][T15299] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1286.847739][T15299] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1286.869562][T15299] EXT4-fs error (device loop1): ext4_fill_super:4466: inode #2: comm syz-executor.1: iget: bad extended attribute block 135266304 [ 1286.886467][T15299] EXT4-fs (loop1): get root inode failed [ 1286.893536][T15299] EXT4-fs (loop1): mount failed 17:42:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:24 executing program 3: syz_open_procfs(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, 0x0) lseek(r0, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:24 executing program 0: syz_open_procfs(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x3, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:24 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='\nxt4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:24 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x4, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:24 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='%xt4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:25 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x5, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:25 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:25 executing program 3: syz_open_procfs(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:26 executing program 3: syz_open_procfs(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, @in6={{0xa, 0x4e22, 0x4, @local, 0x1}}, 0x8, 0xe1d4}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000240)={r3, 0x5}, &(0x7f0000000280)=0xc) 17:42:26 executing program 3: syz_open_procfs(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:27 executing program 3: syz_open_procfs(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:28 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ex\\4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:28 executing program 3: syz_open_procfs(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:28 executing program 3: syz_open_procfs(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:29 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x5, 0x202) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000001c0)=0x2) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x102401e, 0x4) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000100)={0x0, 0xd97, 0x3, 'queue1\x00'}) 17:42:29 executing program 3: syz_open_procfs(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r0, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:30 executing program 3: syz_open_procfs(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r0, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x100000000000000, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:30 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x5421, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) ptrace$getsig(0x4202, r1, 0x1, &(0x7f0000000100)) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 17:42:30 executing program 3: syz_open_procfs(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r0, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:31 executing program 3: syz_open_procfs(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0) fcntl$lock(r0, 0x6, &(0x7f0000000080)={0x2, 0x0, 0xfff, 0x9, r1}) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 17:42:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0xffffffffc4653600, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:31 executing program 3: syz_open_procfs(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r0, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:31 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 17:42:31 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext=\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x0, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:32 executing program 3: syz_open_procfs(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r0, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000011b, 0x0) 17:42:32 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext\\\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:32 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r0, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:32 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x20000, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x2) 17:42:32 executing program 3: syz_open_procfs(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:32 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='extm\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x0, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:32 executing program 5: r0 = syz_open_procfs(0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:32 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x402800, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x101, 0x0) r1 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x9, 0x400) r2 = socket$netlink(0x10, 0x3, 0x6) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, r3, 0x319}, 0x14}}, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) 17:42:32 executing program 3: syz_open_procfs(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:33 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x03', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) sendmsg$sock(r0, &(0x7f0000001740)={&(0x7f00000000c0)=@ax25={{0x3, @bcast, 0x4}, [@bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000000040)="b280", 0x2}, {&(0x7f0000000140)="3b337206dcc932f9cf3503dbaa59ddc9887bd39f658c69470f7899edb1b88447a6b5e926b1a8659f3dc9fd3bf230e5524d19e2468fe9df6b9a77440297a87b1ef4fc18a01b612b4193eb04f3a2b0e1ba37ef998c3d551e56335dd3ef6d085debb2909e3d76714b2b95fa4ce67bcb61eecbd60d4dfaac37161793f7daf0a836ab809e7fc76f8dd09c4fc59438321883099435ddafc9d2f090d9a9fccd246bd21e03c32803f242a0c8ac94d93fc406fbbe16f749c87bf9a5710bbfa6561d1840bde2719ded24beafe9fb1b107a8a28cf4730e0782764b034f53626921bd4b8ec93359c3ff16e8e83df05f95a3d13", 0xed}, {&(0x7f0000000240)="ec690b1021899d53721b1e06e7e5ad36fe07bd9bd8350861564a1851f0747da89fdfe131c7d6feb7490997c8f6b6c6564e888d00f26ce38e6298158e2842eb9ad279e8c8680c82de321711c81f1c52bfac5abcd46c42a4c4f832311914f71a86aa33501947b3e47c2809bb2ef947f01ca864d941648b8c9e71b7b6cc6b439d7682b004468faf8cca19be88f90ef1914b74eb6f15f451beaebe4ea42ee78533c2f8da70c43ef2889a59eb23de6975693a37a18255687f29d639db7b01c719324b70c93332fc39424ea99dc9f40540cf177c31791eaf80cd1d1293824c958e967c98d98e140fe12172ac", 0xe9}, {&(0x7f0000000340)="6868399e79ade324bc02f1ccc6e952f28de2e9895c2762fc74fedf2fa87970d8b28a259dc7f3ea6b52c28e97e48c110f9c2516dc51193cd31e7270d971bbec8d72b362ce12ad5567c745279c0d36d21ac8ca9d6651f60c0611746188f2b31d9c88f46b", 0x63}, {&(0x7f0000001400)="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", 0xfb}, {&(0x7f0000001500)="0290e87a94955467814cf031a302dd579e0c0c935a856e03f1d6acb9a69aa16c503b92bebf886ad0ee754cd526699684349c4e0103e130f6bc4af4dc1d4e2d5f01257cf6acb15c36332c99ceab6f8b5ebd14343fc172d281e1a5df19977db4f039222b9f40a398b58b581d6533f0e94f5b102ac23e0ae75c26428cd70c7f67d8060412924c38254714ead8362ca79b8795e155965930117e96d1ef933651b2a3865d9f72c68a955634543755f8298e32f28bdcdff02a7ad75b5b1f13dee527aa6f56acc62d2082cba5f0c47f9090aa71b780b7", 0xd3}, {&(0x7f0000001600)="6270298d76be75adc5c56d0f2f6be73315452ddad778bdbe597bd2dc031642b34008dd2be59fdfeee0744092ae90bc08c701471693df88bc3fbafb658c5c7974c4fce1f224a3bcc99fa54b89785e55e91d539002e548dfbc76f3858c0fb1313062db8cdb02bf898938a831890315462a7e3d2d8e64bda7bab47e550d2b8e6b0d3a", 0x81}, {&(0x7f00000016c0)="c822c216a48c592fe51c5a53488a27b367cb8505c632e71facaba7ba47f4b1710a09531846a46c963d0d3bebbd99880ca814ae1df8fe540a43e0601fd33d52ba535d27b8ecc6f26c96458aa8faa595914d", 0x51}], 0x9, &(0x7f0000001880)=[@timestamping={{0x14, 0x1, 0x25, 0x278f7446}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffffffffff6}}], 0x60}, 0x40) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000001a40)=0x9, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @mcast1, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000001900), 0x400000000000100, 0x0) stat(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000019c0)='/proc/capi/capi20ncci\x00', 0x4800, 0x0) clock_gettime(0x0, &(0x7f0000001b00)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000001a80)={0x0, 0x0}) futimesat(r1, &(0x7f0000001a00)='./file0\x00', &(0x7f0000001ac0)={{r2, r3/1000+10000}, {r4, r5/1000+30000}}) r6 = dup(r0) setsockopt$bt_l2cap_L2CAP_LM(r6, 0x6, 0x3, &(0x7f0000001780), 0x4) ioctl$SIOCX25GCALLUSERDATA(r6, 0x89e4, &(0x7f0000001900)={0x49, "eb83fa527e18c54e9b4dcc44f6d6749373daa5f6c12478498794618b52bcb4cb9e40a53d4ed33cc4fe8ef13e89aa8c3f26bbcb704000887d9a270350050534b607f0dd56898374dd73310d25c2b5c4e38ceda17f8d9c575dc252b801841ce73306431b11818941de7f353672058eb60f3d88c023bf75bc9ada836c24a06e4399"}) 17:42:33 executing program 3: r0 = syz_open_procfs(0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:33 executing program 0: ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f0000000040)={0x3, 0xfffffffffffffffc}) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$PPPIOCSMRU(0xffffffffffffffff, 0x40047452, &(0x7f0000000080)=0x4) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null]}) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 17:42:33 executing program 5: syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r0, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:33 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x04', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:33 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x10000005473, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000000180)='\x00', 0x0, r0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x100, 0x5) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 17:42:33 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x101000) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x13, r0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) write$capi20_data(r1, &(0x7f0000000100)={{0x10, 0x7, 0x4, 0x82, 0x6, 0x7}, 0xf6, "ba8d2a14b42023fd40a5a5f0fa6b664cfe52c1abc9f9e1d22b816e7aa0923ca47fea14fe20473423a2293deb833962cb0dbc6e2a29f9cab689ab405ac8005867c9c04c1c324014682a68e70db9492004b4f6cfd1d33f9e2b5edb033aa1c8ae276b80430fae664af9f738cdbd5ce75043469fa44a4ded7066f4e40e36b1dd1a3e973da41b490751c2a220d1c1dca9ca3ed6988948a4aabaeba231facda44d413648ddd5faa0535cec66975dbc241fd3c11233930ca123ce652439234f00fee5e563857e268f01a146c00cab8484d9302eaa21b26d4c68f3a349ba5ea3b64fb1d3dae45cafc1699b89e6205b52abc1a47664e6acf1841f"}, 0x108) 17:42:33 executing program 5: syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r0, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:33 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x05', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:33 executing program 3: r0 = syz_open_procfs(0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = add_key(&(0x7f0000000140)='id_resolver\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="a1b1a706763f1d0b68d555838a8173ef7d55410888d847ce10ee5e4984e7d54d1a86f046f6d329c9ff7052cbd071997fd3689a7247b3fc2b0a78646ec5c01a792d897d1f81e9fb610df64e4a4dd2b02a15f4599cb116cb7243e573d7106bceb04fb5ecefcb7e3e87a1e6a33054c0967983436132a7e1f95d7ae2960023d883d058715fbdf3b1bf8a1c9c9a0234e8bb56ae", 0x91, 0xfffffffffffffff9) keyctl$get_persistent(0x16, r1, r2) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}, 0xfffffffffffffffd}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) 17:42:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:34 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x40000, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r1, 0x118, 0x0, &(0x7f0000000200)=0x506, 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x58, &(0x7f0000000280)=[@in6={0xa, 0x4e21, 0x1, @loopback, 0x3}, @in6={0xa, 0x4e21, 0x400, @rand_addr="29b8e489a3eefda277c233d53dc931d1", 0x20}, @in={0x2, 0x4e23, @local}, @in={0x2, 0x4e20, @loopback}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000100)={r2, @in={{0x2, 0x4e20, @loopback}}}, &(0x7f0000000240)=0x84) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000001c0)=@assoc_value={r3, 0x81}, 0x1) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10080000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r4, 0x400, 0x70bd2b, 0x25dfdbfe, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x2404c815}, 0x400c4) 17:42:34 executing program 5: syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r0, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:34 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x06', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:34 executing program 3: syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r0, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) recvfrom$rxrpc(r1, &(0x7f00000028c0)=""/79, 0x4f, 0x2, &(0x7f0000000040)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e21, 0x1, @rand_addr="6e5187e6d2005789d2eae01f803edc45", 0x100000001}}, 0x24) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) write$binfmt_elf64(r1, &(0x7f0000002940)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x8, 0x5, 0x6, 0xad2, 0x3, 0x3e, 0x2, 0x29f, 0x40, 0x318, 0x9, 0x5, 0x38, 0x2, 0x4, 0x80, 0xe2}, [{0x7474e551, 0x3, 0x3, 0x1f, 0x7fff, 0x7f, 0x4}, {0x7, 0x977, 0x4, 0x4c1, 0x4, 0xc1e, 0xffffffffffffff1e, 0x1}], "76bbdb3eb396fb6b1aefb35788c8da0abb1064ad2b774ca43be278040f6bf2424d475c0a8af80c489b8aeda0818fa13e5f294c94697041d24d05e38742ff4bf4fe21b5ddf25f852e497274e410ad3ce1", [[], [], []]}, 0x400) recvmmsg(r0, &(0x7f0000002780)=[{{&(0x7f0000000140)=@l2, 0x0, &(0x7f0000000600)=[{&(0x7f00000001c0)=""/26}, {&(0x7f0000000200)=""/133}, {&(0x7f00000002c0)=""/129}, {&(0x7f0000000400)=""/200}, {&(0x7f0000000500)=""/240}], 0x0, &(0x7f0000000680)=""/141}, 0xfffffffffffff000}, {{&(0x7f0000000740)=@vsock, 0x0, &(0x7f0000000900)=[{&(0x7f00000007c0)=""/115}, {&(0x7f0000000380)=""/24}, {&(0x7f0000000840)=""/185}]}, 0x10001}, {{&(0x7f0000000940)=@generic, 0x0, &(0x7f0000000e00)=[{&(0x7f00000009c0)=""/88}, {&(0x7f0000000a40)=""/247}, {&(0x7f0000000b40)=""/32}, {&(0x7f0000000b80)=""/189}, {&(0x7f0000000c40)=""/126}, {&(0x7f0000000cc0)=""/231}, {&(0x7f0000000dc0)=""/64}], 0x0, &(0x7f0000000e80)=""/93}, 0xba}, {{&(0x7f0000000f00)=@ipx, 0x0, &(0x7f0000002440)=[{&(0x7f0000000f80)=""/124}, {&(0x7f0000001000)=""/241}, {&(0x7f0000001100)=""/223}, {&(0x7f0000001200)=""/165}, {&(0x7f00000012c0)=""/99}, {&(0x7f0000001340)=""/4096}, {&(0x7f0000002340)=""/212}], 0x0, &(0x7f00000024c0)=""/72}, 0x8}, {{&(0x7f0000002540)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x0, &(0x7f0000002640)=[{&(0x7f00000025c0)=""/66}], 0x0, &(0x7f0000002680)=""/240}, 0x9}], 0x400000000000208, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:34 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 17:42:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, 0x0, 0x0, 0x0) membarrier(0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000500)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2XzJs\xd1\xaa\x8f\x83\x91\x17\x9a\xdf:\x99\'\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, 0x0, 0x0, 0x0) membarrier(0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000500)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2XzJs\xd1\xaa\x8f\x83\x91\x17\x9a\xdf:\x99\'\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:34 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x101000, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000080)={0x38, 0x6, 0x0, {0x1, 0x1, 0xf, 0x0, '/dev/vhost-net\x00'}}, 0x38) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 17:42:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x0, 0x4) 17:42:35 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\a', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:35 executing program 3: syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r0, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, 0x0, 0x0, 0x0) membarrier(0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000500)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2XzJs\xd1\xaa\x8f\x83\x91\x17\x9a\xdf:\x99\'\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:35 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) syncfs(r0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 17:42:35 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\b', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:35 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2100, 0x0) 17:42:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:35 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\t', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f00000001c0)=@v3={0x3000000, [{0x9, 0x3ff}, {0x3, 0x8}], r2}, 0x18, 0x1) [ 1298.660056][T15906] mmap: syz-executor.0 (15906) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 17:42:36 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) r1 = socket(0x1, 0x4, 0x7) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r2, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x4) ioctl$int_in(r0, 0x40000000af01, 0x0) r3 = fsopen(&(0x7f00000000c0)='efs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x5, 0x20000) ioctl$TUNSETNOCSUM(r4, 0x400454c8, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000100)) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f0000000000)=0x69a, 0x4) 17:42:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x0, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:36 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\n', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:36 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) accept$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000300)=0xe8) setsockopt$inet6_dccp_int(r1, 0x21, 0xa, &(0x7f0000000480)=0x7ff, 0x4) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x280801, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB="2c64466c74679d643d", @ANYRESHEX=r2, @ANYBLOB=',noextend,msize=0x0000000000000008,euid>', @ANYRESDEC=r3, @ANYBLOB=',\x00']) 17:42:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x200, 0x80) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000740)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x21000}, 0xc, &(0x7f0000000700)={&(0x7f0000000540)={0x1c0, r2, 0x28, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x58, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x14c, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4a94e239}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe554}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x98}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa89}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}]}]}, 0x1c0}, 0x1, 0x0, 0x0, 0x4040001}, 0x4c0d0) recvfrom$unix(r1, &(0x7f0000000040)=""/58, 0x3a, 0x10040, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) add_key$user(0x0, 0x0, &(0x7f00000000c0)="4e8dcecb3ee4b15b4f1516c79ebed85290f27bd402ea11ffe1f33f14870ee74848e22292c7d9624e037f9c4970bf2a0d33d3d83bca345ad70ece9a069c1940268857ae82fffe8c03b38a70e59670e9f8804e8c5c17c58d66cabdc3ad3ac9868100"/112, 0x7, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:36 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(0xffffffffffffffff, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:37 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4#', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:37 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000013c0)='io.stat\x00', 0x0, 0x0) bind$can_raw(r1, &(0x7f0000001400), 0x10) r2 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001600)={{{@in, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000001700)=0xe8) sendmsg$nl_route_sched(r1, &(0x7f0000002040)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x200001}, 0xc, &(0x7f0000002000)={&(0x7f0000001740)=@newtfilter={0x898, 0x2c, 0x2, 0x70bd2a, 0x25dfdbfd, {0x0, r3, {0x0, 0xb}, {0xfff1, 0x10}, {0xa}}, [@TCA_RATE={0x8, 0x5, {0x5, 0x9f86}}, @filter_kind_options=@f_flow={{0xc, 0x1, 'flow\x00'}, {0x858, 0x2, [@TCA_FLOW_POLICE={0xc, 0xa, @TCA_POLICE_AVRATE={0x8, 0x4, 0x5}}, @TCA_FLOW_BASECLASS={0x8, 0x3, {0xf, 0xfff3}}, @TCA_FLOW_KEYS={0x8, 0x1, 0x17d8e}, @TCA_FLOW_POLICE={0x408, 0xa, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x3, 0x2, 0xfffffffffffeffff, 0x10001, 0x1, 0x6, 0x2, 0x2, 0xfff, 0x8, 0x3, 0x5, 0x7, 0xfffffffffffffffe, 0x3, 0xffffffff, 0x7f, 0x7fffffff, 0x0, 0x7f, 0x4, 0x0, 0x100000000, 0xf7, 0x9, 0x20, 0x9, 0x0, 0x1, 0x80000001, 0x8, 0x20, 0x8728, 0x21, 0x101, 0x2, 0xfffffffffffff8b3, 0x336, 0xc2e, 0x3, 0x1, 0x2, 0x400, 0x0, 0x3f, 0x400, 0x74, 0x7, 0x300000000, 0x100000001, 0xd270, 0x1000, 0x2, 0xbe, 0x0, 0x923a, 0x7, 0x3f, 0x3b0, 0x9b0, 0x81, 0x5, 0x58f, 0xfffffffffffffbff, 0x40, 0x1893, 0x101, 0x0, 0x412, 0x5, 0x4, 0x3, 0x6, 0xb8f, 0x1, 0xfff, 0x3, 0x1, 0x3, 0x9, 0x4, 0x4, 0x81, 0xfffffffffffffffa, 0x84, 0x81, 0x4, 0x7ff, 0x2, 0x2, 0xf065, 0x8, 0x7ff80, 0x9, 0x2, 0x3, 0x0, 0xaeba, 0xd8c, 0x1, 0x3, 0x40, 0x80000000, 0xfff, 0x20, 0x4, 0x318, 0x3, 0x5, 0x4, 0x9, 0x4, 0x8, 0x40, 0xed, 0x2, 0xfff, 0x7fff, 0x65, 0x401, 0x7f, 0x1, 0x96a, 0x2, 0x6, 0xfffffffffffffff8, 0x81, 0x8000, 0x6, 0x5, 0x8, 0x1, 0x15, 0x4, 0x3, 0x200, 0x7fff, 0xffffffffffffff7f, 0x80000000, 0x3f, 0x7, 0x40, 0x2, 0x5, 0x80000000, 0x8, 0x80000000, 0x1b197546, 0x7, 0x1, 0xf4b9, 0x754, 0x5, 0xfffffffffffffffb, 0xc3, 0x8, 0x71b, 0x0, 0x8, 0xfffffffffffffffb, 0x7, 0x4, 0x6, 0x485800000000000, 0x8000, 0x1, 0x5, 0x1, 0x5, 0x2a9ab529, 0x100000001, 0x9, 0xff, 0x100, 0x4, 0x40, 0xcc4, 0x8, 0x1000, 0x10000, 0x2, 0x7ff, 0x7, 0x1, 0x7, 0x5, 0x80000000, 0x7, 0x7, 0x3b, 0x0, 0x80000001, 0x4, 0x200, 0x1, 0x8, 0xffffffff, 0x9, 0x4, 0x9, 0x2, 0x100000001, 0xdcd, 0x400000000000000, 0xffff, 0x7, 0x6, 0x3, 0xff, 0x6, 0x5, 0x7f, 0x0, 0x652d804d, 0x3, 0x401, 0xef, 0xffff, 0x400, 0x2, 0x1, 0x5, 0x3, 0x7fff, 0x401, 0x8962, 0xac6, 0x1ff, 0x10000, 0x8, 0x2, 0x1f, 0x18c4, 0x247, 0x5, 0x3, 0x101, 0xff, 0x3ff, 0x3ff, 0x2d68, 0x800, 0x7, 0x0, 0x7, 0x9e2f, 0x6, 0x7, 0x9, 0x5, 0xff96, 0x6, 0x2, 0x7ff, 0x8, 0x9]}}, @TCA_FLOW_POLICE={0x408, 0xa, @TCA_POLICE_RATE={0x404, 0x2, [0x4, 0x100000001, 0x81, 0x81, 0x6, 0x10000, 0x20, 0x3, 0x5, 0x1ff, 0x2, 0x5, 0x800000000, 0x6, 0x7, 0x3ff, 0x400, 0x605, 0x7ff, 0xfff, 0xfffffffffffffffd, 0x1, 0x9, 0xb4b, 0x6, 0x95, 0x1, 0x7f, 0x5, 0x7, 0x1, 0x80000001, 0x8, 0x100, 0x7f, 0x10001, 0x7, 0x81, 0x2, 0x4, 0x0, 0x9, 0x150f, 0x80, 0x8000, 0x400, 0x10000, 0x10001, 0x6, 0xfffffffffffffff9, 0x1, 0x3, 0x800, 0x5, 0xce, 0x81, 0xba, 0x2, 0x8, 0x5, 0x99, 0x8, 0x0, 0x1f, 0x2, 0xfffffffffffffffa, 0x1, 0x80000000, 0x1, 0x6, 0x7ff, 0x4, 0x400, 0x10000, 0x0, 0x2, 0x800, 0x1, 0x9, 0x3, 0x4ea, 0x276b9eff, 0x3, 0x1000, 0xab, 0x6, 0xe4ea, 0x4, 0x2, 0x9, 0x1, 0x100000001, 0xff, 0xffffffff, 0x39d2, 0x2, 0x7fffffff, 0xbf4, 0x2, 0x6, 0x5, 0x1ff, 0x3ff, 0x7fffffff, 0x8000, 0x6, 0x0, 0x10000, 0x481d, 0x2, 0x1, 0x8, 0xea8, 0x8, 0x0, 0x800, 0x80000000, 0x3, 0x92a2, 0x81, 0x81, 0x23d, 0x2, 0x1ff, 0x400, 0x401, 0x1, 0x200, 0x1, 0x60, 0x3, 0x2, 0xffffffff, 0x34, 0xfffffffffffffffb, 0x1, 0x1, 0x7, 0x1, 0x1000, 0x3, 0xfffffffffffffeff, 0xff, 0x1, 0x80000001, 0x7fffffff, 0x100000000, 0xfffffffffffffffa, 0x6, 0x80, 0x1f, 0x7fff, 0x100000000, 0x6, 0x1, 0x8, 0xfffffffffffffffe, 0x9, 0x8000, 0xc5, 0x9, 0x3, 0x2, 0x4, 0x100000001, 0x7fffffff, 0x5, 0x81, 0x8, 0x2, 0x0, 0x5, 0x0, 0x1, 0x1, 0xfa, 0xe0fb, 0x7f, 0x4, 0xce56, 0x49b88038, 0x2, 0x3, 0xffffffffffff22fb, 0x7, 0x2, 0x0, 0x100, 0xdc, 0x5, 0x9, 0x8, 0x9, 0x2, 0x1, 0x3, 0x4, 0x0, 0x7, 0x8000, 0xfffffffffffffffd, 0x6, 0x24, 0x47, 0x1, 0x9, 0x5, 0x0, 0xa95, 0x8, 0x3ff, 0x100000000, 0x5, 0x1, 0x5, 0xf07, 0x2a2d, 0xffff, 0xeeec, 0x3, 0x7ff, 0x3bd41a46, 0x1e, 0x2, 0x2, 0x2, 0x9, 0x9, 0xc7a6, 0x9d4, 0x8, 0x5a97, 0x8, 0x800, 0x5, 0x6, 0xedda, 0x9, 0x100000000, 0x0, 0x0, 0x3, 0x3, 0x6, 0x6, 0xcf, 0x8000, 0x3, 0x993, 0xaeb, 0x100000001, 0x7, 0x723, 0x3ff, 0x1ff, 0x7]}}, @TCA_FLOW_DIVISOR={0x8, 0x8, 0x13c1}, @TCA_FLOW_ADDEND={0x8, 0x5, 0xfffffffffffffffa}, @TCA_FLOW_KEYS={0x8, 0x1, 0xba5b}, @TCA_FLOW_DIVISOR={0x8, 0x8, 0x2}, @TCA_FLOW_DIVISOR={0x8, 0x8, 0x7}]}}, @TCA_CHAIN={0x8, 0xb, 0x6}]}, 0x898}, 0x1, 0x0, 0x0, 0x4001}, 0xc004) write$FUSE_STATFS(r2, &(0x7f0000000100)={0x60, 0xffffffffffffffda, 0x1, {{0x1, 0xfffffffffffffffa, 0x4, 0x0, 0x1, 0x2, 0x0, 0x7}}}, 0x60) sendto$unix(r2, &(0x7f0000001440)="9f7b503c5f33714d6a48b08c3bbf957af4a9e1ab99d5a8fcd558ed480c70dd2a1956d9b6df7f2508cf06ebf7de158f081d3ca75f8b3b4f11ee241372185a8d8ac6ca99d24d542daf3e3026c59344ef3202b1c1b432c91b2f757efdc56ebd08f61821d138d536b34ba994049b55a67ee8b575afe44832300c74445b91fcf9851b5bb69d635be783134f220fd398a694231a93e3a0f5e10c24884745ce6ffb7191705f1af0f5d5d696011bdd03e7c3c65c070677cbf76ce5bd499f6c9e9743313b891120eef7f1f7ce437b3960599a24b82681c35ff49263daf30cb479b9b40b9a4b04", 0xe2, 0x90, &(0x7f0000001540)=@file={0x1, './file0\x00'}, 0x6e) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) syz_mount_image$minix(&(0x7f0000000180)='minix\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x4, &(0x7f0000001340)=[{&(0x7f0000000200)="455025963cd5e26b7c01aa08ef4d266e20ec68f9ffdaace82ea35e370aac25f03c90d9d2125e1afbbe5dd347f8b288179c3e4e07aebedda5b18516c2625454547770d51a0b123c4cdaee9c76ea272405a78196eadcfcd21c7f8ff4bd5cc0b87d111fb12cf440280d21ce4ec38f3a3ae8f6c4d5ee8250495a4119fd38a148395817fa8c18b31da8fbb30ae126b3b9285be5cfdd50a12874c78502489fab387a43c932", 0xa2, 0x2}, {&(0x7f00000002c0)="7712f4b16aa93837cef39ed91b9cb6d1fc495a6bb7750a90a62f5833fd6dfc341437517f329eeb08e176829cc4", 0x2d, 0x8}, {&(0x7f0000000300)="acb61244c3bf0d3870235a92525a542bb1dfa8ca2f957647313dca8dd8746d5a638168a81df3e96d47028a0495384f", 0x2f, 0x3}, {&(0x7f0000000340)="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", 0x1000, 0xffffffff80000000}], 0x200020, 0x0) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xfff, 0x40080) 17:42:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(0xffffffffffffffff, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(0xffffffffffffffff, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:38 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000025c0)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000002600)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000003780)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x2000, 0x1}) ioctl$int_in(r1, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) r2 = dup2(r1, r1) stat(&(0x7f0000002580)='./file0\x00', &(0x7f0000003700)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r2, &(0x7f00000036c0)={0x0, 0x0, &(0x7f0000003680)=[{&(0x7f0000000300)={0x21a8, 0x17, 0x1, 0x70bd26, 0x25dfdbfc, "", [@generic="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", @nested={0x118c, 0x75, [@generic="660f6812781affcf93732d9c40f2f1000f81b07903f92651ab2246f941ecc0959184e6ed5e249729232d2a157263f7688d1e356d8ef0aad390f45a2228d8e71b85ac65b8816f3fb1ee37ce1968e1a49c27f3a3abe762d0eb8c9402b9ab755c65aadf15ddd2f49271d4762d0c777d78adc4514b91f0d4e141181bc1383687f6c940cfd2875705db00b05076416f330d3354843d94210032ba504b211f4007649c79818448800dfe6bd540d0b7fbba934f1e955b64f5b4fef0eef48bc2873ec9f224807e", @generic="73dc3b50914b55efea75dff733fcf651de42c304e33bcefcb66729ff670235c4", @generic="64e411fafeee985f29836ca3d945242a109936dd5c760a0353c18dad153605ff5f8e2528a7ba2271b827419ad1bcb142a512d5a59a88c79927f30f66f692b5ba1e89419dc0ca77c86717cbd7b9adf427a8e74d3f424d3f7fcb4789603790a9baf56f97e7adea24582446a0b16a9eccc26c40ce217caab436a153b25af61c72289c10eb7af639dba89e387488e4fbc04efd223e04f428365874dc8dfae94a9decadd313", @generic="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"]}, @typed={0xc, 0x79, @u64=0x3}]}, 0x21a8}, {&(0x7f00000024c0)={0x4c, 0x2d, 0x4, 0x70bd2c, 0x25dfdbfe, "", [@generic="381e785167503c6ddbd1853f7bda0c6b37cab977ea9adca7cd6713a18f5206ece142f12dcef4a97ba00ad3c5483177f078b2dd707acaade15b"]}, 0x4c}, {&(0x7f0000002540)={0x24, 0x24, 0x101, 0x70bd2d, 0x25dfdbfd, "", [@generic="b9fa02ac100e33dccd8181f7f194212aed234b"]}, 0x24}, {&(0x7f0000002640)={0x1018, 0xf8d, 0x300, 0x70bd2d, 0x25dfdbfb, "", [@generic="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", @typed={0x8, 0x2e, @uid=r3}]}, 0x1018}], 0x4, 0x0, 0x0, 0x4000000}, 0x24040885) r4 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x7, 0x8000) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) setsockopt$inet6_MRT6_DEL_MFC(r4, 0x29, 0xcd, &(0x7f0000000100)={{0xa, 0x4e24, 0x2, @rand_addr="b353a20768996f145c3e18d653ae34a1", 0xfffffffffffffffd}, {0xa, 0x4e20, 0x2, @local, 0x100000001}, 0xffffffffffffffe0, [0x4, 0x3, 0x4, 0x0, 0x7, 0x400, 0xffffffffffff0000, 0x2]}, 0x5c) listxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/203, 0xcb) r5 = openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r4, 0xc010640c, &(0x7f00000002c0)={0x7ff, 0x368000000}) ioctl$NBD_CLEAR_QUE(r5, 0xab05) 17:42:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x6, 0x101000) openat$cgroup_type(r1, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) getsockopt$inet_int(r1, 0x0, 0x17, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000040)=0xd2c, &(0x7f00000001c0)=0x2) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:38 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4-', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:38 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, 0x0, 0x0, 0x0) membarrier(0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000500)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2XzJs\xd1\xaa\x8f\x83\x91\x17\x9a\xdf:\x99\'\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x0, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:38 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r1 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x48, 0x12002) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000008}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="4000964000", @ANYRES16=r2, @ANYBLOB="00002abd7000fedbdf250100000008000600ac14141d080003003b00000014000700ff010000000000000000000000000001080001004e200000"], 0x40}, 0x1, 0x0, 0x0, 0x1}, 0x8044) 17:42:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x0, 0x2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000001, 0x4000010, r1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x10000, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB="361f34c777db42b6885916fbd30553d8d2dd45f04fe691af1ceaec8a5b27fff37546fdceb5bc297f1fa2215665fbf94f6cda3f1b5fdab572677de3face3364ea9029caea652e216641016357b271a0b2a02ff892f5e1f50db16caba4fe5a5661e2397c4ccce1182da4ee78ff9c644003bcc0cd03875f637cc3121e60fe42c4c4fccd83b4ccfe43cc808d22554bd7278b3fd9ba87a6877aacba5e8bdcba0a0ae2400304ff3519b0322681d02018092abc9af0b62a3f29cdb17347eda342926ff2bed8d1eb4530cb2564d81aff8ff4a1b3ca442ac84d0286e0c12c2c552ab49678f09db6f57f9f3566", @ANYRES16=r3, @ANYBLOB="000529bd7000ffdbdf250300000058000300140002006c6f0000000000000000000000000000140002006e6c6d6f6e3000000000000000000000080008000900000014000600000000000000000000000000000000000800050000000d9208000300030000000800060008000000"], 0x74}}, 0x811) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000280)={0x0, 0x20, "ab111b4584272a7a0af574a93469ab29bf85be3ddd082959b830bd22c654cd0d"}, &(0x7f00000002c0)=0x28) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000300)={r4, @in={{0x2, 0x4e22, @broadcast}}, 0xfffffffffffffc00, 0x7, 0x5, 0xc7, 0x50}, 0x98) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f00000000c0)=0x6) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:38 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4H', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:38 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) accept4(r1, &(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x80, 0x800) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x20200, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000080)) 17:42:38 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4L', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000002d40)=[{{&(0x7f00000000c0)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000000040)=""/16, 0x10}, {&(0x7f0000000140)=""/33, 0x21}], 0x2, &(0x7f00000001c0)=""/224, 0xe0}, 0x8}, {{&(0x7f00000002c0)=@alg, 0x80, &(0x7f0000000380)=[{&(0x7f0000000340)=""/4, 0x4}, {&(0x7f0000000400)=""/135, 0x87}], 0x2, &(0x7f00000004c0)=""/4096, 0x1000}, 0x7}, {{&(0x7f00000014c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @initdev}}}}, 0x80, &(0x7f0000002c00)=[{&(0x7f0000001540)=""/8, 0x8}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000002580)=""/249, 0xf9}, {&(0x7f0000002680)=""/149, 0x95}, {&(0x7f0000002740)=""/237, 0xed}, {&(0x7f0000002840)=""/235, 0xeb}, {&(0x7f0000002940)=""/181, 0xb5}, {&(0x7f0000002a00)=""/178, 0xb2}, {&(0x7f0000002e00)=""/88, 0x58}, {&(0x7f0000002b40)=""/172, 0xac}], 0xa, &(0x7f0000002cc0)=""/106, 0x6a}, 0x2db}], 0x3, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000002ac0)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000002b00)=0x24) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) dup2(r0, r0) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:39 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:39 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x301100, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000001c0)={0x0, 0x0, 0x9}) r2 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x9, 0x28000) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000240)={r1, 0x80000, r2}) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r3, 0x40400000aefd, 0x0) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000040)) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000000000)) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f0000000100)) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x8, 0x90080) 17:42:39 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:40 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4h', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:40 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000500)='/dev/hwrng\x00', 0x220080, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x4e21, 0x7f, @remote, 0x1ff}, 0x1c) ioctl$int_in(r0, 0x5421, &(0x7f0000000580)=0x1) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm_plock\x00', 0x82, 0x0) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f00000004c0)={0x9, 0x10000, 0x6, 0x8, 0x7261cf48, 0xff}) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r2, 0x40000000af01, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1ff, 0x40000) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000000400)={0x20000, 0x0, [0xff, 0x8, 0x0, 0x8, 0x1, 0x1, 0x2, 0x7fff]}) r4 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$describe(0x6, r4, &(0x7f0000000340)=""/156, 0x9c) execveat(r3, &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000280)=[&(0x7f0000000200)='[(#@lo%[+\\*eth1\x00', &(0x7f0000000240)='vboxnet1-\x00'], 0x1000) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) write(r2, &(0x7f00000005c0)="426c9d812354f686cc9648e4eba3d463128f3f76770c0e68f2684290cdd70e74b1f5304c403a37a4a2b5698e5f2c7ab8f171f47708ee9a075101b6f9aefcfb86b1f5ea5a5f74c4e446bc071d1ca311eb4fd61137939171b3eb34912614bd9e32fc3c8370c77cae", 0x67) ioctl$RTC_VL_CLR(r3, 0x7014) 17:42:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000400)="c658c00d2e153784ece0a11b059a9a003188d19df64b1a996941e48debaecdce3d4567b54138ffa2f1910184072acc97f6b28b924a9a8954321950098ab7782def1370f3f5a77146e5e43ab51bee5c15313565b64f71b789c3d759475f46a49cc2b0aec4c0e4de0e1c683737d311f9b17e3a94a188f322246c38d8ae5234d03b7c30f4cc3e8c12ebc053b4a75144445570e30a2a7246009ec01e72ddf3ac25775535b5c9476a1c3d9d4d1107a0515e0b15de13a60a3800019aecd09bc5b60132d0d8691f71fb6597cfd9e897705c6823d1dc216e41319b5b9f09f1474b37405e9951ac1a35fdd9c1c062bc8d8887d133ef6044ae4d9de9c29730509e5bf6befb4c2551b739961c9865356bf3e4f0c1be30941133551bb97a165bd360f3d686df31fcae3675114aa98d0bf4afd216761bd0c42529e26e8e2957880af121bd1f4c362c187d387c122ba706a7d66d4cf9a9c3823790b6d05fe93cd62b4f91df41dcbd74747f13c615a4a04380420447708b7dccf68b00ab92a8026de764f4d37d54fc7e2d223057a691e633ab188f8ea6fd4e5f4051b060dc1d18a0dd6ce432ad01dee47cf489e40e04f2b4a6c7a44a7e854088477dbd69fc28cfe9c4fb0e5e5952a2e8b1499faf8595b8f2da0972b0c656e881b81b8cea533b687b5cf877db3b226411e93a4d7ab0b86a254a2ccc11ec471bd1a3364166e9b9272305b29432ba76ca499e9a952193e71a335972494d2b7abe3fd5e8dccda935b3f91f68f98bfe8bc13ed7ff0becbff4e8a9db0b5d84f04a69f6e6d3e7ab92d3ac93edf4716e7c5cb2c3b33735e9fab597b4e0fbb0e8f1946bc8e4dd79b7d91dd900fae26ded53c001839066a5ee544bc9ddf130e92bdf72648f116bca2e5f7ee584d16bf0d215aed1e58138c4004e833a03f1ef8ec16a7406871077bcb9acd8aa363d35d008bb9611bf5236f821a7c1025256f95a4048de37449acb66406dd1dc4cfb060d48e74136ef4c08619c7718910620980c080fd88c378a393cc1d3f1cd91a12d3d43ec4286dd4df7a79ed5138f1d22ad3dbb30ab066e3c5b804d1970d7dd023ed8f188417dd09aeba15da38606382ba603f23ecf55ddefa8d396222ed4eace1e284a80fb53275f47e44165780e9c9190c462afcf68e3ad1930a7485efed9f027439ee38a9b16101cd0c16c53366821757c43a16cbcf67200d51eac92e5e7523bf16ee33db9bc801e74964f3e5344f3ded32fab845412b7e5815e686ba69d3de5076f0a116e13c5877c15d7ec8ada34a48267eee673f70e63a6522aa50b44f413adae0da1a01e0548f4cee453df520cab82cab17e19494f0906570ae3982da2e7d89b1d0652abc3ae917be50e155c8eff4e7ed3650d2c7a4cb4f3457986796b146b895c0c56ba59ba91e253b92579aa30bce3413ba2c72efd5784bcedb46c8a06e0eabd0f908363c5408e520c247da4a7895777c9c9c44e58559d86726fcb3339045d45e1b807278f58582bdb21aef341cfefa0687d0c42eb31387ccef46b94096bff8413e1511dfa94e15fb3844905bc382fe5fe5b3f4c5282ba7b94763b1bb6a836b96cb55a9108216906c7c53f5a9c891ce9a17c8fa55cec1dcb033873acec6ad1ba6dc32c12c2d24053501482a99b6af7ba740755e7ad320fe8838077cea512ffc3a0a9262e444da107c159ec40a5fb9e43786984fc7f00cdecbe53d9347998d68bb302a9aff4f75ba2d4c08a5e8b12b80e819564168edcf1facb93e6c87fd2632da54b8f653f4c02777f7d7869f9d6d6fd6293673116743dbbfdf062af7a39787952faf5fe261ffe46bf400a66e54728c8f5532b4ec906ae602e592083b2ef7198adb815cdaff4cdb6187990643f411436d219424063502b4af96dc2db3184bc312745ca03ea8a064c0beb1619d2c59cab8b811dac9d48ad5236908787deaec17062cff62bedb0254182cca2e21fa9e6060f49a403649e4497dab2935d83e609183dc9dbd6899e5195da9fca03704f19a12350704642691a9f512a05a9ec394d82558a1872b76e9f621feca2ec4be8b46b80971c270463fa33eda9ac283113dfdbfc35e9a37015500c400347b808a8445ae0c5b98f315360c64871fe7066fb1cc97d955aeb93a4b4de84a6c78b4be7c049a09c5af20b9177a783c3718b16a8e3789e8199b025e559919a50fc0d3145eaf7939c4afe047d29e2deece2f23f81642e1ba016d9e044ebbc758be720d131c3d6a6da336281a339473c92e4a5cfc99d208d8c72fdd246a4e56f7317f39714c5f7d4ef73c85b6e47f40178761df9bc83ab3b0ee5e2ec2c9aba77b4352e1135258a3a271d4e808b3798b14d00dbe67ceec8be1671335bbdca20b889a6d52d72877295490cc707c21a1f8a4534d36f70d32c82746e6adb24c9cd249a30c2e11c1e4cdd95d66bf472e934d95b07589481a22020db2824496d69c1f82c0448b14efd81588cda468f8de05344b3b03422da63b11d0dd77c6172a6b1dbca1b99da5eb591d1d27c081ea28c385ffb756c9d4aaa61f3c7cb9e40ad9939016f031687b5eb5be1237e18b0f3d117e5748475a607d09df93c4c3ff5601ffea3694b6e04f78fe6c47fb7a5b6d23eb74f5c5467f2355e6821353f72af841bb8c4b4fbde7ba6c700b3f4bd89710f02a1d5d223912c108e18f2c9ed99e75ab506340cdf5b65228478fe665daee99a8cc9139737e71d82ced24350f5cd424d414f1241b1401dfab3c0e10157d5848707c48d7b65d759e9a4aeb7604cf7520d0e260ba15e06980b1b5fae9f210bb38976ff5eab220e70a28d811bd3c0c41b1ab36c007b3d27027b87b26ac5de8dc38e0444738c8a872fbb673a4b346264e4e023bbf20fb721833b7b86028e531ae57c12f7dbe07407d328e00b1bea443477be05ac2401e7c05552b52bf810efcf023ae087e3ae97352a6691e890cbc6ee2d01ff121b2d2c8d1eea62b063b3cb7d925626686fa1dab16921c10c7b1f6a4a496ab1c35d16e79f4eb37fff047b284b04262c9e7c354012865e1e65814ca4e36ecaa19df1d2e055d6170722b43cc8f217113c93f317fe1edcc9519f18153f3ef3d5570255fbb70919e15974ad77b277707c947ee2f7e68109bb1b414d54fe291b286c7637a46ffdec1fe0789d2a29a7669a010f9f81be58c21bb7566d93820d384d43edb493d93443952dc7a93821404f52b364b9005723a4f04346c9dbf8394a8daebdcd1961b7f9b62dfd8357fc6926ff00ae0026e226915768fefa70f82f3fae4a36920ba35523f274bda0f25539a661f2df072c5a7c41f772d6062134383c6bfbd9b4e7f7498428e8e9746b12557c0e5444c5cb614f67819b80bd3b2f2df0390702338a3bb40f1fb293dff72789edd6a310bed28385eaf91473c7d01a69f99e602d0e7f4cc7c872ba0089ff6555d640e287117647865da7b5005e017cbe52360fdffd3e8503166bb0151fcfbbf610328ca65ea963a93f77497baaede962fb8c355833ded66127d1bbcf350add70391eca42495b369b0d7b38d3428bc410021ba0361b7edc247a4793b5bdcb426ca8c5175784eb7bf7b6126870179e06648d91a2c5a56b41741e57b1244820b07dc051513c3932f0bba09d65e55dcf4e4f7735260b4f5f2c7b32acb6169d1c7cabb8b5aea8e1b51a13f8b073909060b6715359cdf35b44545cf8c9aadd9be4aef7c641b06f653e6e2604eb62331ed7d0f636a0c947537dece48be3089d0e115614aa0230e2e3a7920eddef2ace7e242c9e47f382c712a692d9d79f240c83b69f1ca3d92543dca6b5772e595a4bcb4fee9256d652fdb43e046570bf5719b32a7e0f14799f7f81d7f0ee24d8782b35891a0460c1f5e9bd4649b15dbe774ef7d338ee89282bb18e74f15dc045373d1cdaee4b3adbbbbc142ab00db3149ded0f0a7ddb223eaf944d1a9db9edcbe7accbfc093641ffc76c523bf594d9108715e8ca1576e1221085bd8ced4a303a98fe79464acca62dc889e1a830dddb811602108777b5e97945c58d0eb7ee96e90324aa2029b4f9fba2623cbbe95da925781cc9b2a006c406be86f4b268f84d3b1073b8941df88575fe7d88c7f667dd32e9e68a1b41f7f6364ec96d35a37d3cf3e1030e074095c3f438c3ee86fdb60051adcac0d45dd2ff39d28af46c22d4d14a752a2eb8eedb889fb3d92ad3f039a01643cfb6dda56ba0aa1a18c9158e6be70c401555e2586e481b7bd30abd8cff0dd76c57235c1307db03d2b3bc41cb33ab71323e1e123c318de9553a31db3bb9cf7a45c03d8130c58b1d62cd335cb10eb46914fcee8cc8cf12311eacd3d21db4259ee1067c86f21a68cda62616b5e5340c238c3102d12d1103167a446393ed151beb09ce0956b684ea717011e417443d581354588dd49779d08aaf61446a3231362a9fc0efec8cd2791153274eb8b3a070119690bbcf162e9866cc63f235278750ff6058946911de49d6b137b079839705421747b5d96ab82d1c429d289ab0d62af20a7f1f8ab3f84b719d1a780899f56774e23e2a7745b02ccc2d2ecf48c91b9d7b27110edcb0b51c380e181898faf525024961a687d4db0b6af16d95b5fa194ff0aa4e26abf7027179fe5e7a9dcb69ef38a6ea7c50fb5afa5ecbe45a4e1aa3d3cf7eb5f4be2ee00bb22c32e0e75369122ac6110f2b13869bde1b160c37c222ce0c82c8266c9bdd49b1b19f84c3c1428d9dca1690968b53dc5eb7636c606742f2837183043bc0b6392ec809b854f0ae5b532925a9f8a1f15fa62d853c9524f851f50064620bb0bab87f1ffd7be2231ffd1dd76bbdf822cdd2417ea663434d8db0f7277e5bd146f750a9eb89f0e08057c1e8fdd99fdf35b80c126093e0e0565e181b4427ce2d8e543272e2cfabe08947bf2e16b49f493facf4edd4dad66266431bdf91abf0cb7d09b7ea5321e137411756adeee0a52cd5352a1bb697e00e00d7270fe8d37de77eca125a335fa33933370d30f3b8556741baf6a93cece57753ccbb9d0266bfd922fb94cde9c0507d22ebed49f9ac6ee399b77fbe8c5606d021f38055fa7defb597b431b5f6e42c9aa3aa2e0e22d7ab7fdbe3f8c485bb5c11c3cf19f9f5ed73a39e6757ae1274a5389412b424c29095416d4da08f68f9e5f40dbf29a11366a7d9bd2d0ec17461e1eda3d96166f1eff02bdac3ecd62cf2d0999748bedf2353f1b0138b9b7968955c48775ab03c292a5088e2490ecbed4f1cddf59b43cab7072f556320297c2445aa241dae726d73d2fc66a75fdee2d42739dd11bf725fee06a12b1cb9be471522928a02d655b16f4d7a07fa1670834e465608bf9116b7068349b70b1f0cdc53661063a505193f569eade8a0abe655f85cf9540f5e2917af134309608c2c94c4b5f57f6dba419ddb2dde058a4fc8c1fbb8091a98c067155a08881e98b6ef8ed7a5ef00c547f6c9b7a004c491a31e23238b9a27b3f29ad95d4983a2814c5cf723ff58287ab307c0e4713e6ffd99c522936cc3bfdb67e232dab64ec4217800ccc149e0385e20eaefb22392bb60590b2ad88098a40f71e6e42e185c8c0823759d76b1b692db24e688f5b3ea7d03efe953ddd5f5c38b6ade22c02d66113f1b77d6d5a6a40c8c51ef6cf061ffd147c2c7570160dacf1c6fa373d1d6dead205fdffedf4f0a5dfd0fdc49caacfec4f9eefa3ced7866e017b3ce7c30ca1ec0ff4bbf5c0d3e27d660807a1490a5627f6f17316c6f334666c2be205e6724cc3c3cd21ec924a43c839cce8c40cc4f5c82b5547a016e9b175bc28899d348cbf85b0f413a1ce2dcf04a31ee6e55f6ff35", 0x1000, 0xfffffffffffffffa) request_key(&(0x7f0000000200)='cifs.spnego\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='self\x00', 0x0) request_key(&(0x7f00000002c0)='rxrpc_s\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='/dev/admmidi#\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f0000001400)={'syz', 0x3}, &(0x7f0000001440)='\x00', 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f00000015c0)='keyring\x00', &(0x7f0000001600)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) add_key$user(0x0, 0x0, &(0x7f00000014c0)="4e8143694eb188d3ffc27962f51ddc76695689e45b9efbc7820d8ad63f8fa0b3566fd35fdfabe0d0ba9bb2ccb5f202d3973abdff56833bb8e34d7ea87ed59562c201b8700c360cf0b0e8a1a5bbeeff9cbc5c124f956763d149c1de3ac8f0f7a78153000a0d17adac291c1d72a44b311bc0fac5a0999355b11a586415342b9331638b739b1bb5f2f05e824e420e2e7b466d7b783b739c8f2401251a32173a0920c3d3f3727fc5896339e5afdb47a674d83fb6407c60a0250c351b59f4f12cac7d4a1d292e75f8f6af7c1bd42c87d8d3a1d5bc1050890cbb4ed988e46637d32b3704a8d6b033536267ecfe81a612de0ae4676732", 0x9989a14eff3b2eed, r1) chdir(&(0x7f0000000140)='./file0\x00') recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) r2 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x1f, 0x2000) ioctl$sock_bt_cmtp_CMTPCONNDEL(r2, 0x400443c9, &(0x7f0000000100)={{0x5, 0x0, 0x8, 0x1, 0x800, 0x8001}, 0x80000001}) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 17:42:40 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x0, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:40 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x800000005473, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 17:42:40 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4l', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000380)=[{{&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000400)=[{&(0x7f0000000140)=""/61, 0x3d}, {&(0x7f0000000180)=""/181, 0xb5}, {&(0x7f0000000240)=""/180, 0x9f}, {&(0x7f0000000300)=""/34, 0x22}, {&(0x7f0000000340)=""/50, 0x32}], 0x5, &(0x7f0000000480)=""/233, 0xe9}, 0x2}], 0x1ff, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:40 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:40 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 17:42:40 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4t', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x2, 0x2) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000380)=0xaf) recvmmsg(r0, &(0x7f0000000200), 0x0, 0x40000002, 0x0) socket$alg(0x26, 0x5, 0x0) getsockopt$TIPC_CONN_TIMEOUT(0xffffffffffffffff, 0x10f, 0x82, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$IMGETVERSION(0xffffffffffffffff, 0x80044942, &(0x7f0000000040)) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000180)='vmnet0/\\}]@&GPL+{wlan1\x00', 0x0}, 0x30) iopl(0x2ad) ptrace$setopts(0x4206, r3, 0x2, 0x10) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000003c0)=0x570d, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r2, 0x0, 0x6, &(0x7f0000000140)=':ppp0\x00', r4}, 0x30) 17:42:41 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x80000000, 0x10200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r2, 0xfffffffffffffff8}}, 0x10) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 17:42:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:41 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4z', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:42 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 17:42:42 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\xd8', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) tee(r0, r0, 0x7fff, 0x8) recvmmsg(r0, &(0x7f0000000200), 0x446, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:42 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 17:42:42 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x101080) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x3dc}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000140)={r2, 0xa00000000000000}, &(0x7f0000000180)=0x8) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 17:42:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:42 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:42 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x40080, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r1, 0xc0745645, &(0x7f0000000200)={0x0, [0x2, 0x0, 0x7, 0x4, 0x4, 0x8001, 0x7, 0x200, 0x981, 0x80000000, 0x6, 0x2, 0x7f, 0x0, 0x0, 0x94f3, 0x100000001, 0x4, 0x3, 0xfffffffffffffff9, 0x3, 0x1, 0x3ff, 0xffffffff, 0x8001, 0x0, 0x5, 0x8, 0x40, 0xffffffff, 0xd8b, 0x4, 0xfffffffffffffffe, 0x401, 0x1ff, 0xfffffffffffffff8, 0x9, 0x9, 0x3, 0x988, 0x6, 0x808, 0x1, 0x4, 0xa166, 0x1, 0xa1, 0x401], 0xb}) ioctl$int_in(r0, 0x40000400af03, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000003c0)=0x8, &(0x7f0000000400)=0x2) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000340)=0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000380)=0x0) preadv(r1, &(0x7f00000005c0)=[{&(0x7f0000000440)=""/157, 0x9d}, {&(0x7f0000000500)=""/70, 0x46}, {&(0x7f0000000580)=""/59, 0x3b}], 0x3, 0x0) kcmp(r4, r5, 0x1, r1, r0) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000002c0)={0x8000, 0xf, 0x4, 0x4000, {r2, r3/1000+10000}, {0x7, 0x8, 0xfffffffffffffffa, 0x3, 0x4, 0x7fff, "063a0568"}, 0x1, 0x2, @userptr=0x3f, 0x4}) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x8000, 0x0) ioctl$EVIOCGID(r6, 0x80084502, &(0x7f0000000100)=""/209) 17:42:42 executing program 0: r0 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x800) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)=@ethtool_rxfh={0x46, 0x2, 0x7, 0x7, 0x20, "a44662", 0x7, [0x1000]}}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000140), 0x4) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) [ 1305.580277][T16176] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1305.626919][T16176] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1305.649931][T16176] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1305.686422][T16176] EXT4-fs error (device loop1): ext4_fill_super:4466: inode #2: comm syz-executor.1: iget: bad extended attribute block 135266304 [ 1305.706802][T16176] EXT4-fs (loop1): get root inode failed [ 1305.718686][T16176] EXT4-fs (loop1): mount failed 17:42:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:43 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000080)=0x1) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 17:42:43 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) socketpair(0x8, 0x80002, 0x2, &(0x7f0000004500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000004580)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000004640)={&(0x7f0000004540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000004600)={&(0x7f0000004680)=ANY=[@ANYBLOB="300085139418aaa8d5dace8edde446dc62a2cbff2dc83388d8fb6ab8748c41becb806b466534c5d12ca844563a7ddc8c0ca1fbf0a2db1799c5a389ee8e75b12a722b237279e922db36eb7549de8de86d1cef946958f9bd27a61a35b8c5ff7e598ac19a24998aabc598dae3", @ANYRES16=r2, @ANYBLOB="00022cbd7000ffdbdf2501000000000000000b0000000014001462726f6164636173742d6c696e6b0000"], 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x24000000) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f00000043c0), &(0x7f0000004400)=0xc) recvmmsg(r0, &(0x7f0000006d00)=[{{&(0x7f0000000100)=@nfc_llcp, 0x80, &(0x7f0000000340)=[{&(0x7f0000000180)=""/197, 0xc5}, {&(0x7f0000000280)=""/14, 0xe}, {&(0x7f00000002c0)=""/118, 0x76}], 0x3, &(0x7f0000000400)=""/89, 0x59}, 0xfd}, {{&(0x7f0000000480)=@isdn, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000380)=""/55, 0x37}, {&(0x7f0000000500)=""/179, 0xb3}], 0x2, &(0x7f0000000600)=""/18, 0x12}, 0x1}, {{&(0x7f0000000640)=@x25, 0x80, &(0x7f0000001880)=[{&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/145, 0x91}, {&(0x7f0000001780)=""/127, 0x7f}, {&(0x7f0000001800)=""/54, 0x36}, {&(0x7f0000001840)=""/6, 0x6}], 0x5, &(0x7f0000001900)=""/21, 0x15}, 0x4}, {{&(0x7f0000001940)=@alg, 0x80, &(0x7f0000002e00)=[{&(0x7f00000019c0)=""/180, 0xb4}, {&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/71, 0x47}, {&(0x7f0000002b00)=""/224, 0xe0}, {&(0x7f0000002c00)=""/197, 0xc5}, {&(0x7f0000002d00)=""/236, 0xec}, {0xffffffffffffffff}], 0x7, &(0x7f0000002e80)=""/4096, 0x1000}, 0x5}, {{&(0x7f0000003e80)=@sco, 0x80, &(0x7f0000004000)=[{&(0x7f0000003f00)=""/226, 0xe2}], 0x1, &(0x7f0000004040)=""/65, 0x41}, 0x7fffffff}, {{0x0, 0x0, &(0x7f00000042c0)=[{&(0x7f00000040c0)=""/57, 0x39}, {&(0x7f0000004100)=""/188, 0xbc}, {&(0x7f00000041c0)=""/77, 0x4d}, {&(0x7f0000004240)=""/90, 0x5a}], 0x4, &(0x7f0000004300)=""/3, 0x3}, 0x5}, {{0x0, 0x0, &(0x7f0000006500)=[{&(0x7f0000006f40)=""/4096, 0x1000}, {&(0x7f0000005340)=""/95, 0x5f}, {&(0x7f00000053c0)=""/57, 0x39}, {&(0x7f0000005400)=""/4096, 0x1000}, {&(0x7f0000006400)=""/66, 0x42}, {&(0x7f0000006480)=""/66, 0x42}], 0x6, &(0x7f0000006580)=""/36, 0x24}, 0x2d3}, {{&(0x7f00000065c0)=@hci, 0x80, &(0x7f00000067c0)=[{&(0x7f0000006640)=""/38, 0x26}, {&(0x7f0000006680)=""/157, 0x9d}, {&(0x7f0000006740)=""/94, 0x5e}], 0x3}, 0x9}, {{&(0x7f0000006800), 0x80, &(0x7f0000006b80)=[{&(0x7f0000006880)=""/98, 0x62}, {&(0x7f0000006900)=""/176, 0xb0}, {&(0x7f00000069c0)=""/97, 0x61}, {&(0x7f0000006a40)=""/47, 0x2f}, {&(0x7f0000006a80)=""/238, 0xee}], 0x5, &(0x7f0000006c00)=""/242, 0xf2}, 0x6}], 0x9, 0x41, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000004440)='/dev/dlm_plock\x00', 0x800, 0x0) write$FUSE_INIT(r3, &(0x7f0000004480)={0x50, 0x0, 0x6, {0x7, 0x1f, 0xbf49, 0x4, 0x40, 0x0, 0xb08, 0x9}}, 0x50) sendmmsg(r0, &(0x7f00000092c0), 0x4000043, 0xffffffffffffffff) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000004340)='/dev/snapshot\x00', 0x1, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000004800)={r3, &(0x7f0000004740)="b461867b87394ee3acd89f78b8f7939b93e81ee68d68a479789e96099b52496ccf5d436b00143e65247ae04f1f96bd59b6aa7b78efc1f0af91323f3c47db2debe8c2545865960e7de5c4ce6a155527983552d929fdb4978f2da49585a1d99379742f2bd9c048e280a8e3e8fec2c3f77392aa090f2513bbb7445fcf65f316fa40947695faf3323a767245e154d74499adb7a2d1e6a03955843d1f1baf", &(0x7f00000045c0)=""/59}, 0x18) ioctl$SIOCX25SCAUSEDIAG(r4, 0x89ec, &(0x7f0000004380)={0x81, 0x9}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$BLKRESETZONE(r5, 0x40101283, &(0x7f00000000c0)={0x97, 0x7fffffff}) 17:42:43 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:43 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x10', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:43 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) write$P9_RUNLINKAT(r1, &(0x7f0000000140)={0x7, 0x4d, 0x2}, 0x7) getsockopt$inet_int(r1, 0x0, 0x26, &(0x7f0000000080), &(0x7f0000000100)=0x3) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 17:42:43 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext48', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:44 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x103800, 0x0) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f0000000100)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 17:42:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) getsockname(r0, &(0x7f00000000c0)=@nl, &(0x7f0000000040)=0x80) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f0000000040), 0x0, 0x0) 17:42:44 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:44 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:44 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) socketpair(0x8, 0x80002, 0x2, &(0x7f0000004500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000004580)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000004640)={&(0x7f0000004540)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000004600)={&(0x7f0000004680)=ANY=[@ANYBLOB="300085139418aaa8d5dace8edde446dc62a2cbff2dc83388d8fb6ab8748c41becb806b466534c5d12ca844563a7ddc8c0ca1fbf0a2db1799c5a389ee8e75b12a722b237279e922db36eb7549de8de86d1cef946958f9bd27a61a35b8c5ff7e598ac19a24998aabc598dae3", @ANYRES16=r2, @ANYBLOB="00022cbd7000ffdbdf2501000000000000000b0000000014001462726f6164636173742d6c696e6b0000"], 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x24000000) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f00000043c0), &(0x7f0000004400)=0xc) recvmmsg(r0, &(0x7f0000006d00)=[{{&(0x7f0000000100)=@nfc_llcp, 0x80, &(0x7f0000000340)=[{&(0x7f0000000180)=""/197, 0xc5}, {&(0x7f0000000280)=""/14, 0xe}, {&(0x7f00000002c0)=""/118, 0x76}], 0x3, &(0x7f0000000400)=""/89, 0x59}, 0xfd}, {{&(0x7f0000000480)=@isdn, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000380)=""/55, 0x37}, {&(0x7f0000000500)=""/179, 0xb3}], 0x2, &(0x7f0000000600)=""/18, 0x12}, 0x1}, {{&(0x7f0000000640)=@x25, 0x80, &(0x7f0000001880)=[{&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/145, 0x91}, {&(0x7f0000001780)=""/127, 0x7f}, {&(0x7f0000001800)=""/54, 0x36}, {&(0x7f0000001840)=""/6, 0x6}], 0x5, &(0x7f0000001900)=""/21, 0x15}, 0x4}, {{&(0x7f0000001940)=@alg, 0x80, &(0x7f0000002e00)=[{&(0x7f00000019c0)=""/180, 0xb4}, {&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/71, 0x47}, {&(0x7f0000002b00)=""/224, 0xe0}, {&(0x7f0000002c00)=""/197, 0xc5}, {&(0x7f0000002d00)=""/236, 0xec}, {0xffffffffffffffff}], 0x7, &(0x7f0000002e80)=""/4096, 0x1000}, 0x5}, {{&(0x7f0000003e80)=@sco, 0x80, &(0x7f0000004000)=[{&(0x7f0000003f00)=""/226, 0xe2}], 0x1, &(0x7f0000004040)=""/65, 0x41}, 0x7fffffff}, {{0x0, 0x0, &(0x7f00000042c0)=[{&(0x7f00000040c0)=""/57, 0x39}, {&(0x7f0000004100)=""/188, 0xbc}, {&(0x7f00000041c0)=""/77, 0x4d}, {&(0x7f0000004240)=""/90, 0x5a}], 0x4, &(0x7f0000004300)=""/3, 0x3}, 0x5}, {{0x0, 0x0, &(0x7f0000006500)=[{&(0x7f0000006f40)=""/4096, 0x1000}, {&(0x7f0000005340)=""/95, 0x5f}, {&(0x7f00000053c0)=""/57, 0x39}, {&(0x7f0000005400)=""/4096, 0x1000}, {&(0x7f0000006400)=""/66, 0x42}, {&(0x7f0000006480)=""/66, 0x42}], 0x6, &(0x7f0000006580)=""/36, 0x24}, 0x2d3}, {{&(0x7f00000065c0)=@hci, 0x80, &(0x7f00000067c0)=[{&(0x7f0000006640)=""/38, 0x26}, {&(0x7f0000006680)=""/157, 0x9d}, {&(0x7f0000006740)=""/94, 0x5e}], 0x3}, 0x9}, {{&(0x7f0000006800), 0x80, &(0x7f0000006b80)=[{&(0x7f0000006880)=""/98, 0x62}, {&(0x7f0000006900)=""/176, 0xb0}, {&(0x7f00000069c0)=""/97, 0x61}, {&(0x7f0000006a40)=""/47, 0x2f}, {&(0x7f0000006a80)=""/238, 0xee}], 0x5, &(0x7f0000006c00)=""/242, 0xf2}, 0x6}], 0x9, 0x41, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000004440)='/dev/dlm_plock\x00', 0x800, 0x0) write$FUSE_INIT(r3, &(0x7f0000004480)={0x50, 0x0, 0x6, {0x7, 0x1f, 0xbf49, 0x4, 0x40, 0x0, 0xb08, 0x9}}, 0x50) sendmmsg(r0, &(0x7f00000092c0), 0x4000043, 0xffffffffffffffff) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000004340)='/dev/snapshot\x00', 0x1, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000004800)={r3, &(0x7f0000004740)="b461867b87394ee3acd89f78b8f7939b93e81ee68d68a479789e96099b52496ccf5d436b00143e65247ae04f1f96bd59b6aa7b78efc1f0af91323f3c47db2debe8c2545865960e7de5c4ce6a155527983552d929fdb4978f2da49585a1d99379742f2bd9c048e280a8e3e8fec2c3f77392aa090f2513bbb7445fcf65f316fa40947695faf3323a767245e154d74499adb7a2d1e6a03955843d1f1baf", &(0x7f00000045c0)=""/59}, 0x18) ioctl$SIOCX25SCAUSEDIAG(r4, 0x89ec, &(0x7f0000004380)={0x81, 0x9}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$BLKRESETZONE(r5, 0x40101283, &(0x7f00000000c0)={0x97, 0x7fffffff}) 17:42:44 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x0, 0x200) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='\x00', r1}, 0x10) ioctl$int_in(r0, 0x40000000af01, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 1306.984925][T16232] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1307.005525][T16232] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1307.036284][T16232] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1307.058862][T16232] EXT4-fs error (device loop1): ext4_fill_super:4466: inode #2: comm syz-executor.1: iget: bad extended attribute block 135266304 17:42:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x0, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:44 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x882, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000100)={0x3, r1}) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r2, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) [ 1307.108098][T16232] EXT4-fs (loop1): get root inode failed [ 1307.131222][T16232] EXT4-fs (loop1): mount failed 17:42:44 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:44 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:44 executing program 0: r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x100) fsetxattr(r0, &(0x7f0000000040)=@known='trusted.overlay.nlink\x00', &(0x7f0000000080)='/dev/vhost-net\x00', 0xf, 0x2) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) socket(0x0, 0xa, 0x80000001) socket(0x1f, 0x6, 0x8) r2 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f00000001c0)) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x11, r1, 0x0) [ 1307.505280][T16262] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1307.544989][T16262] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1307.556860][T16262] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1307.588989][T16262] EXT4-fs error (device loop1): ext4_fill_super:4466: inode #2: comm syz-executor.1: iget: bad extended attribute block 135266304 [ 1307.646481][T16262] EXT4-fs (loop1): get root inode failed [ 1307.660137][T16262] EXT4-fs (loop1): mount failed 17:42:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:45 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) socket$inet6(0xa, 0x3, 0x8) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x10000, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x3, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000100)) 17:42:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:45 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)) 17:42:45 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:45 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:45 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x1000, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) fcntl$getownex(r0, 0x10, &(0x7f0000000100)) syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) fadvise64(r0, 0x0, 0x7ff, 0x2) [ 1308.293374][T16291] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 17:42:45 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x4}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000100)={r1, 0xfff}, &(0x7f0000000140)=0x1) r2 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x200000) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000240)={{{@in=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000000340)=0xe8) syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'ip6erspan0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000900)={0x0, @loopback, @empty}, &(0x7f0000000940)=0xc) recvmmsg(r0, &(0x7f0000007280)=[{{&(0x7f0000000b40)=@ll={0x11, 0x0, 0x0}, 0x80, &(0x7f0000002f40)=[{&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000001bc0)=""/26, 0x1a}, {&(0x7f0000001c00)=""/94, 0x5e}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f0000002c80)=""/73, 0x49}, {&(0x7f0000002d00)=""/160, 0xa0}, {&(0x7f0000002dc0)=""/219, 0xdb}, {&(0x7f0000002ec0)=""/47, 0x2f}, {&(0x7f0000002f00)}], 0x9, &(0x7f0000003000)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000004000)=@x25={0x9, @remote}, 0x80, &(0x7f0000004140)=[{&(0x7f0000004080)=""/191, 0xbf}], 0x1}, 0x1000}, {{&(0x7f0000004180)=@nl=@proc, 0x80, &(0x7f00000042c0)=[{&(0x7f0000004200)=""/142, 0x8e}], 0x1}, 0x80000001}, {{&(0x7f0000004300)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast2}}, 0x80, &(0x7f0000004740)=[{&(0x7f0000004380)=""/202, 0xca}, {&(0x7f0000004480)=""/79, 0x4f}, {&(0x7f0000004500)=""/38, 0x26}, {&(0x7f0000004540)=""/55, 0x37}, {&(0x7f0000004580)=""/189, 0xbd}, {&(0x7f0000004640)=""/83, 0x53}, {&(0x7f00000046c0)=""/91, 0x5b}], 0x7, &(0x7f00000047c0)=""/24, 0x18}, 0x6}, {{&(0x7f0000004800)=@rc, 0x80, &(0x7f0000005b40)=[{&(0x7f0000004880)=""/4096, 0x1000}, {&(0x7f0000005880)=""/165, 0xa5}, {&(0x7f0000005940)=""/57, 0x39}, {&(0x7f0000005980)=""/148, 0x94}, {&(0x7f0000005a40)=""/53, 0x35}, {&(0x7f0000005a80)=""/78, 0x4e}, {&(0x7f0000005b00)}], 0x7, &(0x7f0000005bc0)=""/213, 0xd5}, 0x1}, {{&(0x7f0000005cc0)=@ax25={{0x3, @bcast}, [@bcast, @netrom, @default, @netrom, @remote, @bcast, @remote, @bcast]}, 0x80, &(0x7f0000007180)=[{&(0x7f0000005d40)=""/175, 0xaf}, {&(0x7f0000005e00)=""/165, 0xa5}, {&(0x7f0000005ec0)=""/4096, 0x1000}, {&(0x7f0000006ec0)=""/136, 0x88}, {&(0x7f0000006f80)=""/82, 0x52}, {&(0x7f0000007000)=""/227, 0xe3}, {&(0x7f0000007100)=""/73, 0x49}], 0x7, &(0x7f0000007200)=""/99, 0x63}, 0xe6}], 0x6, 0x141, &(0x7f0000007400)={0x77359400}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000007480)={'lapb0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000007c80)={'vcan0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000007cc0)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@local}}, &(0x7f0000000440)=0xfffffdd0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000008f80)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000009080)=0xe8) accept$packet(r0, &(0x7f00000090c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000009100)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000009140)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000009240)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f000000b980)={@multicast1, @rand_addr, 0x0}, &(0x7f000000b9c0)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f000000ba00)={0x11, 0x0, 0x0}, &(0x7f000000ba40)=0x14) recvmmsg(r0, &(0x7f0000010540)=[{{&(0x7f000000bc00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f000000bcc0)=[{&(0x7f000000bc80)=""/15, 0xf}], 0x1, &(0x7f000000bd00)=""/70, 0x46}, 0x100000000}, {{&(0x7f000000bd80)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000000be80)=[{&(0x7f000000be00)=""/93, 0x5d}], 0x1, &(0x7f000000bec0)=""/209, 0xd1}, 0xff}, {{0x0, 0x0, &(0x7f000000d400)=[{&(0x7f000000bfc0)=""/211, 0xd3}, {&(0x7f000000c0c0)=""/4096, 0x1000}, {&(0x7f000000d0c0)=""/1, 0x1}, {&(0x7f000000d100)=""/202, 0xca}, {&(0x7f000000d200)=""/251, 0xfb}, {&(0x7f000000d300)=""/198, 0xc6}], 0x6, &(0x7f000000d480)=""/233, 0xe9}, 0xa5600}, {{0x0, 0x0, &(0x7f000000fa80)=[{&(0x7f000000d580)=""/190, 0xbe}, {&(0x7f000000d640)=""/244, 0xf4}, {&(0x7f000000d740)=""/152, 0x98}, {&(0x7f000000d800)=""/166, 0xa6}, {&(0x7f000000d8c0)=""/102, 0x66}, {&(0x7f000000d940)=""/4096, 0x1000}, {&(0x7f000000e940)=""/109, 0x6d}, {&(0x7f000000e9c0)=""/56, 0x38}, {&(0x7f000000ea00)=""/4096, 0x1000}, {&(0x7f000000fa00)=""/83, 0x53}], 0xa, &(0x7f000000fb40)=""/2, 0x2}, 0xffff}, {{&(0x7f000000fb80)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f000000ff80)=[{&(0x7f000000fc00)=""/85, 0x55}, {&(0x7f000000fc80)=""/10, 0xa}, {&(0x7f000000fcc0)=""/14, 0xe}, {&(0x7f000000fd00)=""/235, 0xeb}, {&(0x7f000000fe00)=""/88, 0x58}, {&(0x7f000000fe80)=""/216, 0xd8}], 0x6, &(0x7f0000010000)=""/115, 0x73}, 0x7}, {{&(0x7f0000010080)=@generic, 0x80, &(0x7f0000010240)=[{&(0x7f0000010100)=""/110, 0x6e}, {&(0x7f0000010180)=""/163, 0xa3}], 0x2, &(0x7f0000010280)=""/47, 0x2f}}, {{0x0, 0x0, &(0x7f0000010400)=[{&(0x7f00000102c0)=""/181, 0xb5}, {&(0x7f0000010380)=""/127, 0x7f}], 0x2, &(0x7f0000010440)=""/227, 0xe3}, 0x1ff}], 0x7, 0x100, &(0x7f0000010700)={0x0, 0x1c9c380}) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000010740)={@initdev, 0x0}, &(0x7f0000010780)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000010e80)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000010e40)={&(0x7f00000074c0)=ANY=[@ANYBLOB="74060000", @ANYRES16=r3, @ANYBLOB="200028bd7000fddbdf250300000008000100", @ANYRES32=r4, @ANYBLOB="b40002003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r5, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000100000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000000000008000600", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="3c00020038b3fde0200000006e00000000000000006572605f657276616c000000f9ffffffffffffff080003000300000008000400f0c500000800010075e421bec69e99db07e31bd7e2bba0b67d09576effe596e1a22bae7fc05a9b2d4c093eb9de1a116b668bb91d81198159db7d000400", @ANYRES32=r8, @ANYBLOB="b400020038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400d65c000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000700000008000600", @ANYRES32=r9, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000104000008000100", @ANYRES32=r10, @ANYBLOB="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", @ANYRES32=r11, @ANYBLOB="0800070000000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000800000008000600", @ANYRES32=r12, @ANYBLOB="3c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000008000100", @ANYRES32=r13, @ANYBLOB="4400020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040005000000080007000000000008000100", @ANYRES32=r14, @ANYBLOB="f80102004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r15, @ANYBLOB="080007000000000038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400030000006c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000003c0004004a000004970000003f0003ff08ffffffbb080405070000009b00010906000000f500006201000000030000070900000005003c05070000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r16, @ANYBLOB="4c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001c00040000100109010000000600050003000000008000380500000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040002000000080007000000000008000100", @ANYRES32=r17, @ANYBLOB="8000020038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000300000044000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b757000000000"], 0x674}}, 0x8000) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) [ 1308.338490][T16291] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 17:42:45 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) [ 1308.411641][T16291] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1308.467801][T16291] EXT4-fs error (device loop1): ext4_fill_super:4466: inode #2: comm syz-executor.1: iget: bad extended attribute block 135266304 17:42:45 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 1308.521769][T16291] EXT4-fs (loop1): get root inode failed [ 1308.545571][T16291] EXT4-fs (loop1): mount failed 17:42:45 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x210100, 0x0) 17:42:45 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) [ 1308.937241][T16334] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1308.965828][T16334] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1308.998815][T16334] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1309.020842][T16334] EXT4-fs error (device loop1): ext4_fill_super:4466: inode #2: comm syz-executor.1: iget: bad extended attribute block 135266304 [ 1309.034961][T16334] EXT4-fs (loop1): get root inode failed [ 1309.040823][T16334] EXT4-fs (loop1): mount failed 17:42:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x0, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:46 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:46 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x3) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64\x00', &(0x7f0000000100)='/dev/vhost-net\x00', 0xf, 0x3) ftruncate(0xffffffffffffffff, 0xffffffffffffa0c0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 17:42:46 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x8, 0x1) setsockopt$inet_udp_int(r1, 0x11, 0xb, &(0x7f0000000180)=0x3, 0x4) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000000c0)={0x80000, 0x0, [0x48c, 0x1000000000000, 0xea, 0x2, 0xb4, 0x81, 0x6, 0x10001]}) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:46 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:46 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) close(r0) [ 1309.428506][T16351] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1309.474665][T16351] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 17:42:46 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x7051, 0x410000) open_tree(r1, &(0x7f0000000100)='./file0\x00', 0x8000) ioctl$KVM_SMI(r1, 0xaeb7) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x4200, 0x0) [ 1309.517364][T16351] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock 17:42:46 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 1309.613334][T16351] EXT4-fs error (device loop1): ext4_fill_super:4466: inode #2: comm syz-executor.1: iget: bad extended attribute block 135266304 17:42:46 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0xffffffffffffffff, 0x20000, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000001580)=ANY=[@ANYBLOB="080000000000000000600000000000001000000000000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/16], @ANYBLOB="00000000000000000400000000000000c800000000000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/200], @ANYBLOB="000000000000000000000000000000001800000000000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00'/24], @ANYBLOB="00000000000000000000000000000000a300000000000000", @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB='\x00'/163], @ANYBLOB="00000000000000000030000000000000cb00000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00'/203], @ANYBLOB="000000da1bc2ce9d868dfe29d27d2e8835df790000000000", @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'/4096], @ANYBLOB="000000000000000000301000000000009f00000000000000", @ANYPTR=&(0x7f00000013c0)=ANY=[@ANYBLOB='\x00'/159], @ANYBLOB="00000000000000000470000000000000e100000000000000", @ANYPTR=&(0x7f0000001480)=ANY=[@ANYBLOB='\x00'/225], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 1309.654738][T16351] EXT4-fs (loop1): get root inode failed [ 1309.660574][T16351] EXT4-fs (loop1): mount failed 17:42:47 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x8001, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x3, @rand_addr="9892990a5862883c5917157cf0f83e2b", 0x8}, 0x1c) 17:42:47 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x400000, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x101000, 0x0) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000000000)=""/119, &(0x7f0000000100)=0x77) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000180)) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000240)=""/157) 17:42:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:47 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:47 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:47 executing program 2: r0 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x0, 0x2) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f0000000200)={0x2, 0x351, 0x7}) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x800, 0x80000) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[@ANYBLOB="2321202e209724282f1e8af42d202f6465762f75646d6162756600206c6f2f376e6f6465762d2476626f786e7973746562756600202f6465762f6275732f7573622f3030232f30302300202f6465762f6275732f7573622f3030232f0730230020200a19e74927732f38c4e8614e9e136101dd18bd26d6fb830fbdf1d5687029192eb8419e2a716bf5afd3ede3720b2a48bb44dcaff614dc3fd1072c907200985b65c7d637a3e40a494e0fa362c6616dd33aba402b6fb998c624fb3a97753edddc77fa914a04d30e6a2b1e806a0e3b1b01917e65eaf60c78c714cf74a89b3abe0272ad3ec65ec12771adbcd367cc111c512b0f000037d35f93a40adef52e870ede445766a88bd2170e53835f10d919d4f5000ca2a41928422b9a66529aec1cd5e38858765b38191d4aa801441673febf0803db6b26c9b2af22b44e6e8b17d541fa1a84d14050eefd3fa6742bc86b8150b62a81c1b3f2355335537f3a57919958e6c9ec197fc5f090cfb676233d3f35b2adf1d0974c0824869b5fe69644b8ec7d34d56425c51cd0812830053a51d3c38f749c896793fa0b0dca10c702b7d83cee9db41193c2c04daae66fb02c4367657eac775b229b43264157b32600"/456], 0xaa) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f0000000100)=""/153) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x1000001b2, 0xfffffffffffffffd) recvmmsg(r1, &(0x7f0000000200), 0x38c, 0x0, 0x0) r3 = getpgid(0x0) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000240)=r3) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x40000000000014d, 0x0) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/udmabuf\x00', 0x2) 17:42:47 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) flock(r0, 0xf) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 17:42:47 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:48 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000040)=@un=@abs, &(0x7f0000000100)=0x80) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000140)={0x0, 0x4}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e20, @local}}}, 0x84) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 1310.736215][T16395] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1310.775146][T16395] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 17:42:48 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 1310.794588][T16395] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1310.824652][T16395] EXT4-fs error (device loop1): ext4_fill_super:4466: inode #2: comm syz-executor.1: iget: bad extended attribute block 135266304 17:42:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() [ 1310.847241][T16395] EXT4-fs (loop1): get root inode failed [ 1310.857350][T16395] EXT4-fs (loop1): mount failed 17:42:48 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x280800, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000140)) 17:42:48 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x04', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:48 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x2, @mcast1}, 0xffffffffffffff94) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:49 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:49 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) write$UHID_INPUT2(r1, &(0x7f0000000180)={0xc, 0xbf, "116a5a76ecb090419c48a5391cb8d50bcfe33e61c5eeb40b05ac089fd905e25f19f588a3e004e084838b10fd62f8b2219ae09cb7412cd4b572ce6bf52e0974c8ea820cc888c50f500eae2bc4776c000b1507d53d37cde12d1c54882dfcb0665e975b9856fbb0df2c20f2ea6d550e3f33cc8547689daed3fda71d6c1aac09d22b35ac230bb444d773228f8a1e6cf49a5924be8c0f64a65523480a40339db9d40596389993c1fd61e91258bc52d868e6f926dbebe94881dd555e8ca06e949f53"}, 0xc5) 17:42:49 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4 ', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:49 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:49 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x5421, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x3, 0x40001) 17:42:49 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, 0x0, 0x0) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:49 executing program 2: r0 = socket$inet6(0xa, 0x7, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e25, 0x2}, 0x1c) add_key$user(0x0, 0x0, &(0x7f0000000100)="f026de008d495669e8531d9989fba7864275f2ebd0", 0x14, 0xfffffffffffffffd) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80, 0x0) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0)=0x7, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:49 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:49 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x5422, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 17:42:49 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:49 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, 0x0, 0x0) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 1312.532081][T16484] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1312.576393][T16484] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1312.589700][T16484] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1312.646393][T16484] EXT4-fs error (device loop1): ext4_fill_super:4466: inode #2: comm syz-executor.1: iget: bad extended attribute block 135266304 [ 1312.663267][T16484] EXT4-fs (loop1): get root inode failed [ 1312.669127][T16484] EXT4-fs (loop1): mount failed 17:42:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:50 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$llc(r1, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x10) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r2, 0x3) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000340)={0x14, 0x0, &(0x7f0000000200)=[@increfs_done={0x40106308, 0x3}], 0xfc, 0x0, &(0x7f0000000240)="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"}) r3 = accept(0xffffffffffffffff, &(0x7f0000000040)=@ax25={{0x3, @rose}, [@null, @netrom, @netrom, @default, @default, @bcast, @netrom, @default]}, &(0x7f0000000100)=0x80) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000000140)) 17:42:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e25}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:50 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:50 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, 0x0, 0x0) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:50 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x10', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:50 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000100)={{0x2, 0x4e23, @loopback}, {0x1, @random="abd7afbe4f9d"}, 0x40, {0x2, 0x4e20, @multicast1}, 'rose0\x00'}) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 17:42:50 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:50 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$inet6(0xa, 0x3, 0x401) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) 17:42:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:50 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:50 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x2000, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)=ANY=[@ANYBLOB="01000100", @ANYRES32=0x0], &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000140)={r2, 0xed11, 0xff}, &(0x7f0000000180)=0x8) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000200)={{0x1, 0x3, 0x1, 0x3, 0x4}}) ioctl$int_in(r0, 0x40000000af01, 0x0) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000240), &(0x7f0000000280)=0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000001c0)={@rand_addr="fc9e9924014f2b9141ba654c0f1b1ae4", 0x6, 0x2, 0x0, 0x9, 0x1, 0x4}, 0x20) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 1313.457715][T16531] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1313.506500][T16531] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1313.524891][T16531] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1313.576090][T16531] EXT4-fs error (device loop1): ext4_fill_super:4466: inode #2: comm syz-executor.1: iget: bad extended attribute block 135266304 [ 1313.633431][T16531] EXT4-fs (loop1): get root inode failed [ 1313.674975][T16531] EXT4-fs (loop1): mount failed 17:42:51 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:51 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 17:42:51 executing program 2: r0 = getpgid(0x0) r1 = getpid() r2 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x400, 0x80280) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) kcmp(r0, r1, 0x4, r2, r3) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r4, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r4, &(0x7f00000092c0), 0x40000000000014d, 0x0) r5 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x46800, 0x0) write$FUSE_GETXATTR(r5, &(0x7f0000000140)={0x18, 0xfffffffffffffff5, 0x2, {0x1000}}, 0x18) 17:42:51 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:51 executing program 0: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x10002) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000000)=0x2) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) [ 1314.154537][T16549] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1314.211535][T16549] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 17:42:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f0000000040)="4e8d43694eb188d3ff", 0x7e, 0xfffffffffffffffe) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x1, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:51 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xdb, 0x8000) write$P9_RLINK(r1, &(0x7f0000000080)={0x7, 0x47, 0x1}, 0x7) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000100)={0x1, 0x3e000000000}) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 1314.279911][T16549] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1314.370331][T16549] EXT4-fs error (device loop1): ext4_fill_super:4466: inode #2: comm syz-executor.1: iget: bad extended attribute block 135266304 [ 1314.425431][T16549] EXT4-fs (loop1): get root inode failed [ 1314.453124][T16549] EXT4-fs (loop1): mount failed 17:42:51 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x50b780, 0x10) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) r2 = accept(0xffffffffffffffff, &(0x7f0000000040)=@pptp={0x18, 0x2, {0x0, @local}}, &(0x7f0000000100)=0x80) bind$unix(r2, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e21}, 0x6e) userfaultfd(0x80000) recvfrom(r0, &(0x7f00000001c0)=""/76, 0x4c, 0x10140, 0x0, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r3 = dup(r2) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000240)={0x2b, 0x4, 0x0, {0x5, 0x9f93, 0x3, 0x0, [0x0, 0x0, 0x0]}}, 0x2b) 17:42:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:52 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:52 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x04', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:52 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x5422, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x8000, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000080)={0x2, 0x4e22, @loopback}, 0x10) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)=0x95) ioctl$int_in(r2, 0x5421, &(0x7f0000000140)=0x80) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000200)=0x295) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 17:42:52 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 17:42:52 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:52 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) [ 1315.497622][T16604] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1315.507965][T16604] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1315.527058][T16604] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1315.595405][T16604] EXT4-fs error (device loop1): ext4_fill_super:4466: inode #2: comm syz-executor.1: iget: bad extended attribute block 135266304 [ 1315.646162][T16604] EXT4-fs (loop1): get root inode failed [ 1315.652056][T16604] EXT4-fs (loop1): mount failed 17:42:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x400001, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0xc19e) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:53 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x4000, 0x8) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getresgid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000300)={0xa0, 0x0, 0x7, {{0x2, 0x2, 0x7, 0x3f, 0x6, 0xa1, {0x2, 0x9, 0x80000000, 0x7ff, 0x2, 0x6, 0x8, 0x6, 0x0, 0x63, 0x1, r2, r3, 0x9, 0x11}}}}, 0xa0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r4 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) r6 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, &(0x7f0000000080)=0x1e, 0x4) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000100)=r5) 17:42:53 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x0) 17:42:53 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) [ 1316.027476][T16625] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1316.076419][T16625] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1316.115018][T16625] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1316.135744][T16625] EXT4-fs error (device loop1): ext4_fill_super:4466: inode #2: comm syz-executor.1: iget: bad extended attribute block 135266304 [ 1316.195322][T16625] EXT4-fs (loop1): get root inode failed [ 1316.216315][T16625] EXT4-fs (loop1): mount failed 17:42:53 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x0) 17:42:53 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 17:42:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) fallocate(r0, 0x2, 0x7289a01b, 0xfffffffffffffffb) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000080)={'hwsim0\x00', {0x2, 0x4e24, @broadcast}}) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:53 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x0) 17:42:53 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:53 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 17:42:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) ppoll(&(0x7f0000000140)=[{r0, 0x100}], 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)={0xc5a}, 0x8) recvmmsg(r0, &(0x7f0000003a40)=[{{&(0x7f0000000200)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x0, &(0x7f0000000680)=[{&(0x7f0000000280)=""/99}, {&(0x7f0000000400)=""/197}, {&(0x7f0000000300)=""/92}, {&(0x7f0000000500)=""/100}, {&(0x7f0000000580)=""/237}], 0x0, &(0x7f0000000700)=""/83}}, {{&(0x7f0000000780)=@sco, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000380)=""/57}, {&(0x7f0000000800)=""/204}, {&(0x7f0000000900)=""/126}, {&(0x7f0000000980)=""/196}, {&(0x7f0000000a80)=""/189}, {&(0x7f0000000b40)=""/68}, {&(0x7f0000000bc0)=""/174}, {&(0x7f0000000c80)=""/57}], 0x0, &(0x7f0000000d40)=""/38}, 0x3}, {{&(0x7f0000000d80)=@generic, 0x0, &(0x7f0000001040)=[{&(0x7f0000000e00)=""/37}, {&(0x7f0000000e40)=""/58}, {&(0x7f0000000e80)=""/175}, {&(0x7f0000000f40)=""/222}], 0x0, &(0x7f0000001080)=""/148}, 0x80000001}, {{&(0x7f0000001140)=@caif=@dgm, 0x0, &(0x7f0000003540)=[{&(0x7f00000011c0)=""/4096}, {&(0x7f00000021c0)=""/237}, {&(0x7f00000022c0)=""/235}, {&(0x7f00000023c0)=""/202}, {&(0x7f00000024c0)=""/97}, {&(0x7f0000002540)=""/4096}], 0x0, &(0x7f00000035c0)=""/167, 0xfffffffffffffec2}, 0x9}, {{0x0, 0x0, &(0x7f0000003900)=[{&(0x7f0000003680)=""/118}, {&(0x7f0000003b80)=""/208}, {&(0x7f0000003800)=""/120}, {&(0x7f0000003880)=""/46}, {&(0x7f00000038c0)=""/47}], 0x0, &(0x7f0000003980)=""/174}, 0x2}], 0x68, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x40, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000003740)={r0, r0}) r2 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000100)=0x1e) connect$inet6(r0, &(0x7f0000003700)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}, 0x7f}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) [ 1316.748115][T16641] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1316.810547][T16641] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1316.884335][T16641] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1316.951513][T16641] EXT4-fs error (device loop1): ext4_fill_super:4466: inode #2: comm syz-executor.1: iget: bad extended attribute block 135266304 [ 1317.011036][T16641] EXT4-fs (loop1): get root inode failed [ 1317.022266][T16641] EXT4-fs (loop1): mount failed 17:42:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:54 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x2, 0x2) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)) geteuid() ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 17:42:54 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x0) 17:42:54 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x0) 17:42:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x1f, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x8042, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:54 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:54 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x2) fsetxattr$security_evm(r0, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@sha1={0x1, "6c435d497aee314162078f076e5b63ef1010d23e"}, 0x15, 0x3) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r1 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x9, 0x2000) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e21, 0x5629, @local, 0x2}, 0x1c) [ 1317.336414][T16673] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1317.379195][T16673] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 17:42:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x401, 0x20000) write$FUSE_IOCTL(r1, &(0x7f00000000c0)={0x20, 0x0, 0x5, {0x200, 0x0, 0x2d9, 0x80000000}}, 0x20) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:54 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x0) [ 1317.459401][T16673] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock 17:42:54 executing program 5: r0 = syz_open_procfs(0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 1317.523965][T16673] EXT4-fs error (device loop1): ext4_fill_super:4466: inode #2: comm syz-executor.1: iget: bad extended attribute block 135266304 [ 1317.544850][T16673] EXT4-fs (loop1): get root inode failed 17:42:54 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = semget$private(0x0, 0x3, 0x250) r2 = getuid() lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@loopback}}, &(0x7f0000000080)=0xe8) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000300)={{0xd6, r2, r3, r4, r5, 0xc, 0x8}, 0x1, 0x80000000, 0xfff}) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 1317.601551][T16673] EXT4-fs (loop1): mount failed 17:42:55 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @local}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x0, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:55 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:55 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x23}}}, 0x400, 0x6, 0x7f, 0xe1d2, 0x3ff}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000080)={r2, 0xc8, &(0x7f00000001c0)=[@in6={0xa, 0x4e22, 0x3, @mcast1, 0x80000000}, @in6={0xa, 0x4e24, 0x36, @remote, 0x6c}, @in6={0xa, 0x4e24, 0x1, @empty, 0x3}, @in6={0xa, 0x4e20, 0x1, @ipv4={[], [], @rand_addr=0x2b}, 0x1}, @in={0x2, 0x4e24, @rand_addr=0x12cf}, @in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e24, 0x8, @ipv4={[], [], @multicast2}, 0x3}, @in6={0xa, 0x4e22, 0xffffffff80000000, @ipv4={[], [], @loopback}, 0xffff}]}, &(0x7f00000002c0)=0x10) r3 = socket(0x0, 0xa, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f0000000340)) 17:42:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:55 executing program 5: syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') membarrier(0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2XzJs\xd1\xaa\x8f\x83\x91\x17\x9a\xdf:\x99\'\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r0, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 1318.334975][T16718] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 17:42:55 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000080)={0x0, 0x0, {0x8, 0x32, 0x11, 0x18, 0x9, 0x4, 0x0, 0x125, 0xffffffffffffffff}}) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 1318.409908][T16718] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 17:42:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() [ 1318.474888][T16718] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock 17:42:55 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x200, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f00000000c0)={0x100000001, 0x6}) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) [ 1318.548147][T16718] EXT4-fs error (device loop1): ext4_fill_super:4466: inode #2: comm syz-executor.1: iget: bad extended attribute block 135266304 [ 1318.630624][T16718] EXT4-fs (loop1): get root inode failed 17:42:55 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='\x00', 0xfffffffffffffffb) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="e46b3d954693f3df6e649428282345a4ad8b9ba270467c9870ca84749a7a935f040b6ab2b6b05d4bf5f508289942ae93dcf9f3d04e3950e31fca6631f416a62a35605e3b622665b071362b58f18d790434ec0fed7d18627c2ae32db76de6bc2de8c2317bc42e5ae9b42431e380e333bfd1d4a6dfdf7754d373f46fa40cebe8da5c76a7f58eaaa94c97d9d03404375733a5ae815748", 0x95, r1) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20ncci\x00', 0x4080, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000002c0)={0x0, 0x6, 0x30, 0x9, 0x1}, &(0x7f0000000300)=0x18) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000340)={r3, 0x2}, &(0x7f0000000380)=0x8) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) [ 1318.679022][T16718] EXT4-fs (loop1): mount failed 17:42:56 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) r1 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x10001, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, &(0x7f0000000080)={0x7fff, 0x3136564e, 0x3, @stepwise={0xc12, 0x4, 0xfff, 0x8000, 0xda, 0x7}}) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 17:42:56 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:56 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xffffffffffffffc7, 0x80) fstat(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x2, {0x0, {0x40, 0x1, 0x7}, 0x4, r2, r3, 0xd3d8, 0xffff, 0x80, 0xfffffffffffffffe, 0xbcd, 0x100, 0xec, 0x8, 0x4, 0x7, 0x8001, 0x401, 0x9, 0x7, 0x400}}, 0xa0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 1319.196075][T16755] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1319.232625][T16755] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1319.285279][T16755] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1319.364959][T16755] EXT4-fs error (device loop1): ext4_fill_super:4466: inode #2: comm syz-executor.1: iget: bad extended attribute block 135266304 [ 1319.420942][T16755] EXT4-fs (loop1): get root inode failed [ 1319.446917][T16755] EXT4-fs (loop1): mount failed 17:42:57 executing program 3: syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') membarrier(0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2XzJs\xd1\xaa\x8f\x83\x91\x17\x9a\xdf:\x99\'\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r0, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24, 0xfffffffffffffffb, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x94}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:57 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af02, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x40, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f00000000c0)={0x8001008, 0x7f, 0x1}) 17:42:57 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:57 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='\x00', 0xfffffffffffffffb) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="e46b3d954693f3df6e649428282345a4ad8b9ba270467c9870ca84749a7a935f040b6ab2b6b05d4bf5f508289942ae93dcf9f3d04e3950e31fca6631f416a62a35605e3b622665b071362b58f18d790434ec0fed7d18627c2ae32db76de6bc2de8c2317bc42e5ae9b42431e380e333bfd1d4a6dfdf7754d373f46fa40cebe8da5c76a7f58eaaa94c97d9d03404375733a5ae815748", 0x95, r1) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20ncci\x00', 0x4080, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000002c0)={0x0, 0x6, 0x30, 0x9, 0x1}, &(0x7f0000000300)=0x18) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000340)={r3, 0x2}, &(0x7f0000000380)=0x8) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:57 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af05, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000080)={@loopback, @rand_addr=0x9, @dev={0xac, 0x14, 0x14, 0x11}}, 0xc) fcntl$setpipe(r0, 0x407, 0xfffffffffffffff8) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 1320.226678][T16775] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1320.268266][T16775] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1320.297898][T16775] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock 17:42:57 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x3, 0x20200) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 1320.344609][T16775] EXT4-fs error (device loop1): ext4_fill_super:4466: inode #2: comm syz-executor.1: iget: bad extended attribute block 135266304 [ 1320.366765][T16775] EXT4-fs (loop1): get root inode failed [ 1320.379580][T16775] EXT4-fs (loop1): mount failed 17:42:57 executing program 0: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video2\x00', 0x2, 0x0) write(r0, &(0x7f00000001c0)="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", 0x1000) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000001300)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040)="918abe0b7ab90cf3ead46f924c6bd122d44b20fdc27727ec410c4b395d939516c9dd53b9b8a917b03d0ed8972b93150b93ea7650f90b", 0x36, r1}, 0x68) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) 17:42:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x0, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:57 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:57 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) getsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 1320.626718][T16804] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1320.667681][T16804] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1320.699975][T16804] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock 17:42:58 executing program 0: syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') membarrier(0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2XzJs\xd1\xaa\x8f\x83\x91\x17\x9a\xdf:\x99\'\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r0, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 1320.751778][T16804] EXT4-fs error (device loop1): ext4_fill_super:4466: inode #2: comm syz-executor.1: iget: bad extended attribute block 135266304 [ 1320.785758][T16804] EXT4-fs (loop1): get root inode failed [ 1320.806420][T16804] EXT4-fs (loop1): mount failed 17:42:58 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e24, 0x4, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x43, &(0x7f00000000c0), &(0x7f0000000100)=0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000080)) getpeername$inet(r1, &(0x7f0000000140)={0x2, 0x0, @multicast1}, &(0x7f0000000180)=0x10) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xff, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r2, 0x810c5701, &(0x7f0000000200)) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0xf) 17:42:58 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='\x00', 0xfffffffffffffffb) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="e46b3d954693f3df6e649428282345a4ad8b9ba270467c9870ca84749a7a935f040b6ab2b6b05d4bf5f508289942ae93dcf9f3d04e3950e31fca6631f416a62a35605e3b622665b071362b58f18d790434ec0fed7d18627c2ae32db76de6bc2de8c2317bc42e5ae9b42431e380e333bfd1d4a6dfdf7754d373f46fa40cebe8da5c76a7f58eaaa94c97d9d03404375733a5ae815748", 0x95, r1) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20ncci\x00', 0x4080, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000002c0)={0x0, 0x6, 0x30, 0x9, 0x1}, &(0x7f0000000300)=0x18) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000340)={r3, 0x2}, &(0x7f0000000380)=0x8) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:58 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) [ 1321.306640][T16827] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1321.337213][T16827] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1321.382697][T16827] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1321.454659][T16827] EXT4-fs error (device loop1): ext4_fill_super:4466: inode #2: comm syz-executor.1: iget: bad extended attribute block 135266304 [ 1321.510397][T16827] EXT4-fs (loop1): get root inode failed [ 1321.533163][T16827] EXT4-fs (loop1): mount failed 17:42:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:42:59 executing program 0: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:59 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x14e24, 0x0, @rand_addr, 0x1}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:59 executing program 3: syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') membarrier(0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2XzJs\xd1\xaa\x8f\x83\x91\x17\x9a\xdf:\x99\'\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r0, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:59 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\xc0', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:59 executing program 0: syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') membarrier(0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000500)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2XzJs\xd1\xaa\x8f\x83\x91\x17\x9a\xdf:\x99\'\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r0, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r0, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:59 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)='\x00', 0xfffffffffffffffb) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="e46b3d954693f3df6e649428282345a4ad8b9ba270467c9870ca84749a7a935f040b6ab2b6b05d4bf5f508289942ae93dcf9f3d04e3950e31fca6631f416a62a35605e3b622665b071362b58f18d790434ec0fed7d18627c2ae32db76de6bc2de8c2317bc42e5ae9b42431e380e333bfd1d4a6dfdf7754d373f46fa40cebe8da5c76a7f58eaaa94c97d9d03404375733a5ae815748", 0x95, r1) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20ncci\x00', 0x4080, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000002c0)={0x0, 0x6, 0x30, 0x9, 0x1}, &(0x7f0000000300)=0x18) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000340)={r3, 0x2}, &(0x7f0000000380)=0x8) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:59 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:42:59 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:42:59 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) accept4(r0, &(0x7f00000000c0)=@pppoe, &(0x7f0000000040)=0x80, 0x80800) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) 17:42:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x0, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() [ 1322.189154][T16867] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1322.222047][T16867] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 17:42:59 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7ff, 0x50000) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f00000000c0)) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) [ 1322.288458][T16867] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1322.381065][T16867] EXT4-fs error (device loop1): ext4_fill_super:4466: inode #2: comm syz-executor.1: iget: bad extended attribute block 135266304 [ 1322.482641][T16867] EXT4-fs (loop1): get root inode failed [ 1322.488535][T16867] EXT4-fs (loop1): mount failed 17:43:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:43:00 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:43:00 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e24, 0x1, @rand_addr, 0x5966b335}, 0xffffffffffffffac) add_key$user(0x0, 0x0, &(0x7f00000003c0)="000000000000000090", 0x1, 0xfffffffffffffffd) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) recvmmsg(r0, &(0x7f0000000b40)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000200)=""/74, 0x4a}], 0x1, &(0x7f00000002c0)=""/204, 0xcc}, 0x800}, {{&(0x7f0000000400)=@sco, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000c00)=""/123, 0x7b}, {&(0x7f0000000500)=""/173, 0xad}, {&(0x7f00000005c0)=""/83, 0x53}, {&(0x7f0000000640)=""/175, 0xaf}, {&(0x7f0000000700)=""/234, 0xea}, {&(0x7f0000000800)=""/105, 0x69}, {&(0x7f0000000880)=""/28, 0x282}], 0x7, &(0x7f0000000940)=""/71, 0x47}, 0x10fdab55}, {{&(0x7f00000009c0)=@nfc, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000a40)=""/147, 0x93}], 0x1}, 0x8}], 0x3, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/if_inet6\x00') ioctl$VIDIOC_S_INPUT(r1, 0xc0045627, &(0x7f0000000140)=0x7) 17:43:00 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x0f', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:43:00 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:43:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:43:00 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:43:00 executing program 0: syz_open_procfs(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 1323.858401][T16910] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock 17:43:01 executing program 5 (fault-call:6 fault-nth:0): syz_open_procfs(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1324.352094][T16921] RSP: 002b:00007f20636f4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1324.360519][T16921] RAX: ffffffffffffffda RBX: 00007f20636f4c90 RCX: 0000000000459829 [ 1324.368584][T16921] RDX: 000000002000008f RSI: 0000000020000080 RDI: 0000000000000005 [ 1324.376558][T16921] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1324.384536][T16921] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20636f56d4 [ 1324.392595][T16921] R13: 00000000004c961a R14: 00000000004e0998 R15: 0000000000000007 17:43:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:43:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) add_key$user(0x0, 0x0, &(0x7f00000003c0)="4e8d43694eb188d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0xfffffcaf) sendmmsg(r0, &(0x7f00000092c0), 0x40000000000014d, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) 17:43:01 executing program 5: syz_open_procfs(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:43:01 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) close(r0) 17:43:02 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) ioctl$DRM_IOCTL_IRQ_BUSID(r1, 0xc0106403, &(0x7f00000001c0)={0x9, 0x77da, 0x4, 0x8001}) r2 = shmget$private(0x0, 0x600000, 0x400, &(0x7f00009fd000/0x600000)=nil) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e24, 0x10000, @loopback, 0x10000}, {0xa, 0x4e21, 0x5, @ipv4={[], [], @broadcast}, 0x7}, 0x3ff00000000000, [0x3, 0x100, 0x8, 0x7ff, 0x1000, 0x10000, 0xb2a, 0x101]}, 0x5c) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000100)=0x81) shmat(r2, &(0x7f0000bd3000/0x1000)=nil, 0x2000) close(r0) 17:43:02 executing program 5: syz_open_procfs(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 1324.935643][T16945] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock 17:43:02 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) stat(&(0x7f0000003580)='./file0\x00', &(0x7f00000035c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000003640)={0x0, 0x0, 0x0}, &(0x7f0000003680)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000036c0)={0x0}, &(0x7f0000003700)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000003740)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000003840)=0xe8) stat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f0000003a00)=[{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000100)="5870617a74e07140c9f632a1c889fe7b98595fdb5fdc69ffe3cd7ced2a89969a58f5d76e086791eb6d7fccea5608859c68713712ae6a6de6c44379954d121f3a88e231597b5cd3049435e12e8652b76c4e59335231743d8a256dac0c5c7f20136f181c6a2a47a2c59f7f4e3ffaf96b30769ed19677ac00fd8797527b80fdfdef84fa6bc20d59f7a9862abcafec990f6d7c", 0x91}], 0x1, 0x0, 0x0, 0x40000}, {&(0x7f0000000200)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000003500)=[{&(0x7f0000000280)="ea187d6a", 0x4}, {&(0x7f00000002c0)="edc7e14c9ee121bb3320782fecc7fb9b869a36f0c614379b8e4b047a9d52b2b04f5991d214809b9ff1663cae627d1e3d55880432dc81873a9d6f1dc931d098afc3cf31ecea2ee41155756661ab46374767c9a828caa0164541cefa3ec01c949b744bf14b703610ce069a344b24b1115498622e4837db25d2cf1cafa17e2777c63a0ec25b6ea42a53b9b2e7f34c26fc8f5a0ab84d8375ab8e1b20f31e1303b4da74c05594378001a927cb98ab43215d5833dc0f710a2e6136065fb90398bd254702", 0xc1}, {&(0x7f00000003c0)="833549db16db1be094b567b96059438243ef7372d92059cf53e60bf6cdf0ba3f591f980a7db2c66c0bed22dc460c591eae60c7f37accb496773f3b9454575b0ff107", 0x42}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="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", 0x1000}, {&(0x7f0000002440)="b6d77e0a9cdb2fdf856cc9dd1599167dc4336dc3284ee0541b0142191d5049b6a52600600839350051f975eeeb1cb6cc7120fb7b548f1cfa54e73c4ff708d0b353d821b3319a823f072fc0bcf229e926d10f13a7c884af483b23e1d1807a57b1a185535ce37eca41ad06179ebb2f85385647ac044785e8ae413500bae9b561c393ed0cbbf7e9349b416800f00bbdc606f444dba3a11b52fc47b33228b47bdb88cd49ef3d15051198d5e105770d02ef819f5f07c1db06ec994b29b678f0b1", 0xbe}, {&(0x7f0000002500)="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", 0x1000}], 0x7, &(0x7f0000003940)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x38, 0x1, 0x1, [r0, r1, r1, r0, r0, r0, r0, r0, r0, r1]}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x90, 0x40000}], 0x2, 0x40) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000003a80)=[@in6={0xa, 0x4e22, 0x1f, @dev={0xfe, 0x80, [], 0x23}, 0x10000000}, @in={0x2, 0x4e24, @local}], 0x2c) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f0000003ac0)={'veth1\x00', 0x6, 0x7}) close(r0) 17:43:02 executing program 5: syz_open_procfs(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf, 0x1f, 0x2}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:43:02 executing program 0: syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) close(r0) ioctl$VIDIOC_G_STD(r1, 0x80085617, &(0x7f0000003a40)) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000080)=0x0, &(0x7f0000000180), &(0x7f00000001c0)) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000003a80)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000200)={{{@in=@initdev, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000300)=0xe8) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_netfilter(r1, &(0x7f0000003a00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000039c0)={&(0x7f0000003ac0)=ANY=[@ANYBLOB="843500000601000226bd7000fddbdf2505000004cc001b000c0084006d643573756d5b0008007d00e0000002140046002f6465762f736e617073686f7400000014003f000000000000000000000000000000000008000500", @ANYRES32=r2, @ANYBLOB="0877003b678326d6e6784a90cc63e46a7897119168529191e68b00ee5668a94ed8468c73f278bedb577b2134d5890e3b499499da6dc78f8854ed7c63b166a54222c39bdaa274ef4b57a9eed9d7254a4641ac4c37228904d064f2259e659b1cacb0c202cfb2634d253c34fecaaea3862ae49cea97e117c79fe16fefc631bc2ce615ffac3837a7", @ANYRES32=r1, @ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="0094000d0008006500", @ANYRES32=r4, @ANYBLOB="14000a00fe80000000000000000000000000001f5c000e007f8f28de9e94567de63eeab30baaee8db8d4e1571c302cdd63bf5be7d9abcdcb282d9387fe8dd68c1478817a356a7742e22db487a7af51a2ae6a7e6db13618e26c48e363229eccfd4052e581d30b32795dc4b03c7bb4000008004900", @ANYRES32=r5, @ANYBLOB="3cc8a6784dae4fd9963925b4ae0000000000"], 0x3584}, 0x1, 0x0, 0x0, 0x80}, 0x24000000) 17:43:02 executing program 5: syz_open_procfs(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, 0x10000}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r3, 0x4) [ 1326.105379][T17022] EXT4-fs (loop1): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 1326.142194][T17022] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps superblock [ 1326.172266][T17022] EXT4-fs (loop1): ext4_check_descriptors: Inode table for group 0 overlaps superblock [ 1326.200133][T17022] EXT4-fs error (device loop1): ext4_fill_super:4466: inode #2: comm syz-executor.1: iget: bad extended attribute block 135266304 [ 1326.217034][T17022] EXT4-fs (loop1): get root inode failed [ 1326.223233][T17022] EXT4-fs (loop1): mount failed 17:43:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 17:43:03 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) syncfs(r0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @empty}}, [0x1, 0x3, 0x7fffffff, 0x3, 0x4e5, 0x2, 0x3, 0x5, 0x736, 0x2a5, 0x0, 0xfff, 0x4, 0x7, 0x7]}, &(0x7f0000000000)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000000c0)={r2, 0x9}, &(0x7f0000000240)=0x8) fcntl$addseals(r1, 0x409, 0x4) connect$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x4, {0x7fff, 0x8001, 0x3, 0x81, 0x6, 0x7}, 0x5, 0xff2}, 0xe) close(r0) 17:43:03 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf, 0x1f, 0x3}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 17:43:03 executing program 5: syz_open_procfs(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c') lseek(r1, 0x20400000, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf, 0x1f, 0x4}, 0x2000008f) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) [ 1326.848651][T17060] anon [ 1326.848668][T17060] flags: 0x1fffc000008002d(locked|uptodate|dirty|active|swapbacked) [ 1326.860242][T17060] raw: 01fffc000008002d dead000000000100 dead000000000122 ffff88809467e001 [ 1326.906747][T17060] raw: 00000000000200d9 0000000000000000 0000000200000000 ffff88806505e880 [ 1326.945749][T17060] page dumped because: VM_BUG_ON_PAGE(PageActive(page)) 17:43:04 executing program 1: sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="3800000000000000290007009d4d000000bbc15230087c67921ab203000059780a4a448af3459b349b050008000007180000000003c11c8703a50000f7de7292aace00000000000600000300eafffe800000000000000000000000000000fe39a7d6c92000000a00ff680f10000001000200010000000000000000000500b8f37f56353bf60000001b00000000e2a116e766a5ab00a622b847db03670235527d35ac2bfeed9720eb5c5083cdb5a675e9f14f959c7c3e4f0bd7977c6b42726aa839623383645007f92473cd8b4d84e9fa96cdbfc9004dcf68a64b7d8aabf581d5c5e900000000000000000000000000d3"], 0xf0}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000000500000040000080000000000000006d5ebe5a0000ffff53ef", 0x10a, 0x400}], 0x1, 0x0) 17:43:04 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f0000000100)}}, 0x10) close(r0) 17:43:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() [ 1326.956060][T17060] page->mem_cgroup:ffff88806505e880 [ 1327.005631][T17060] ------------[ cut here ]------------ [ 1327.011174][T17060] kernel BUG at mm/vmscan.c:1156! [ 1327.080341][T17060] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1327.086739][T17060] CPU: 0 PID: 17060 Comm: syz-executor.5 Not tainted 5.3.0-rc3-next-20190806 #60 [ 1327.095958][T17060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1327.102880][ T3878] kobject: 'loop2' (000000006bb2bb48): kobject_uevent_env [ 1327.106652][T17060] RIP: 0010:shrink_page_list+0x2872/0x5430 [ 1327.119585][T17060] Code: d9 ea ff ff e8 5f 26 dd ff 4c 8d 6b ff e9 1c db ff ff e8 51 26 dd ff 48 8b bd 10 ff ff ff 48 c7 c6 00 88 93 87 e8 0e 12 07 00 <0f> 0b e8 37 26 dd ff be 08 00 00 00 4c 89 ef e8 fa f3 17 00 4c 89 [ 1327.135420][ T3878] kobject: 'loop2' (000000006bb2bb48): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1327.139308][T17060] RSP: 0018:ffff8880676ff598 EFLAGS: 00010246 [ 1327.139320][T17060] RAX: 0000000000040000 RBX: 0000000000000020 RCX: ffffc900109de000 [ 1327.139328][T17060] RDX: 0000000000040000 RSI: ffffffff819c1f07 RDI: ffffed100cedfe97 [ 1327.139337][T17060] RBP: ffff8880676ff730 R08: 0000000000000021 R09: ffffed1015d060d9 [ 1327.139346][T17060] R10: ffffed1015d060d8 R11: ffff8880ae8306c7 R12: dffffc0000000000 [ 1327.139364][T17060] R13: ffffea0000e2b640 R14: 0000000000000000 R15: ffffea0000e2b648 [ 1327.195560][T17060] FS: 00007f55d1025700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1327.204508][T17060] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1327.211114][T17060] CR2: 00007f3134d35848 CR3: 000000008ff77000 CR4: 00000000001406f0 [ 1327.219121][T17060] Call Trace: [ 1327.222600][T17060] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 17:43:04 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) close(r0) 17:43:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xff, 0x1) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000000c0)="d45cdb94d3f9303fce9bf8220885694ac4db5d6d9bcf7f0fcde31384eff05ad77aaf02cc00602615f1d08c7ed5aa1b942e153b38c511110af4b3853a8f9b3a78551d0998205b5e662f5630ac0e41c2bacd04db9d50792e1de04aea246ca48271068b3b7fe402ca50ac806d32cb0dcaa4354b5a42cf907574a9b7f7fa6dbbfefeb176e0cbc316cd0f40dd52a83e9379f047bd2ea7", 0x94) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f00000001c0)={{0x9, 0x5}, {0xb43e00000, 0xffff}, 0xffffffff, 0x1, 0x9}) add_key$user(0x0, 0x0, &(0x7f0000000180)="4e8d43695c6588d3ff", 0x9, 0xfffffffffffffffd) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000240)=0x5, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x0, 0xfffffffffffffffc) vmsplice(r1, &(0x7f00000006c0)=[{&(0x7f0000000280)="5866d64440240e14c26e81b1c64278cd0b3d067a08cd06cd97d375ee2e4237ffa2096889728fabb94fbb55b5e8b93930610609a6be116d1df6a5e1a9400d28c38f74232a1be3050d3a88aadd585ea615a1ab92e359a703ff41b1e6039c30c54f4ad63b3d25164a9b6c8cd9a2e661daad33e63b24378d5161603d900e014eee2bde86ab98f345341351a1e11f7981c58082a19b47b449", 0x96}, {&(0x7f0000000340)="9d01ec34cc3a62ead6c59fbeb6eca5318eb812ff96b94d8acd8bd9704e6239e726ff026dcd0d15c934001d9c8a1ba6dea9efdf585559dec0b92d342750b5c4e0fa73ed5d42ca83f2f6997a65cff991363debc250014076d2e3a6ddbea73bc40549352d14fede84888863266b30582000a27541cd41556d095bb75800306cfb040df75e0e5baa15a570f0719bce6effbcc95713dc24d82ecfcf09336238bd9e773a4114a827305af596bbd983954cb41babf3e0a44a6ffd39efd85e4646681d646b5fc0", 0xc3}, {&(0x7f0000000440)="74d0f3d2b4db301a4cfed58643df3004be7f89a4d635471ed005b650b4ff53fca92d43b31f38bc7d42bb38b74010cd4e4e51f4777c24711bde2ee6cff65ab146d7928d964eccefd9c7c93bf21ef6ccec96c150051ccf6bc52e68ec5cbded9ce7327ca8aed6c394bb06bb592d8b3decb10fe019e1808acf55287182df3b399b25ea543563e42b21be71c2deace9cd2906e050023677cc0e0d8d", 0x99}, {&(0x7f0000000500)="a9f0f793219dc2f9f2dd42ab9c81e3e5b37d1b142faab743fb6c02816fc098fe54dce144f7ca651b1d8580db90e0e6602ae629bcd4afe0e7a47c6a5397db276c7cb522523b3dfd5ba6407c033863393f518fba4b5b039b8846fd4702341f81b59c7bd5e0c76410331982545b2b8be51c2602d83aa4b2d76edb82e2fdb22073c4b485162f", 0x84}, {&(0x7f00000005c0)="121766e0016e8b5b6c386e39845eb037ea7131a5d973e79de2f74e3991dec3751e925f2a7f5567d9c3275400c6e8822570f0f6d0ee1a79b03f8f4fbb1c376cfd8d2b321a0731ba418e421ec84a1b18b8cce66414f61b444b682ed92b1790958cb1d4c6bfe2a7c952a258bcff1ca88cef7c172e57b0810fc4cbe0b6088bf0b716a1f52db9b33f1bc3398340aa451eee299c6941407b93c381e552808a30de64aad4e08688a85f19b07757aa36c005b0f799426d3a44bc8a54d4be6db0adafca495a4c7375fb89d5c6e9bc7df699241fe4db194d7b4109829967534f6d3fd4e467c1f477556703d694", 0xe8}], 0x5, 0x4) 17:43:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x10, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() [ 1327.228859][T17060] ? rmap_walk_anon+0x5a5/0xbf0 [ 1327.233728][T17060] ? page_evictable+0x3b0/0x3b0 [ 1327.238596][T17060] ? remove_migration_ptes+0xd5/0x130 [ 1327.244071][T17060] ? lock_downgrade+0x920/0x920 [ 1327.248938][T17060] reclaim_pages+0x3b8/0x8f0 [ 1327.253537][T17060] ? reclaim_clean_pages_from_list+0xc80/0xc80 [ 1327.259712][T17060] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1327.266011][T17060] ? lock_downgrade+0x920/0x920 [ 1327.270885][T17060] ? __kasan_check_read+0x11/0x20 [ 1327.275922][T17060] ? _raw_spin_unlock_irq+0x5e/0x90 [ 1327.281213][T17060] ? __kasan_check_read+0x11/0x20 [ 1327.286245][T17060] ? do_raw_spin_unlock+0x57/0x270 [ 1327.287649][ T3878] kobject: 'loop4' (000000002434fcb4): kobject_uevent_env [ 1327.291374][T17060] madvise_cold_or_pageout_pte_range+0x2264/0x2e20 [ 1327.305963][T17060] ? swapin_walk_pmd_entry+0x670/0x670 [ 1327.307490][ T3878] kobject: 'loop4' (000000002434fcb4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1327.311522][T17060] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 17:43:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x6, 0x10001, 0x0, 0x5}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x10, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() [ 1327.311537][T17060] ? futex_wait_queue_me+0x3cc/0x590 [ 1327.311551][T17060] ? handle_futex_death.part.0+0x250/0x250 [ 1327.311566][T17060] ? swapin_walk_pmd_entry+0x670/0x670 [ 1327.311577][T17060] __walk_page_range+0xd2a/0x1680 [ 1327.311596][T17060] walk_page_range+0x1a6/0x3e0 [ 1327.311611][T17060] madvise_pageout_page_range.isra.0+0xdd/0x120 [ 1327.311622][T17060] ? madvise_cold+0x210/0x210 [ 1327.311636][T17060] ? swapin_walk_pmd_entry+0x670/0x670 [ 1327.311653][T17060] ? mark_held_locks+0xf0/0xf0 [ 1327.311665][T17060] ? __kasan_check_write+0x14/0x20 [ 1327.311678][T17060] madvise_pageout+0x227/0x3a0 [ 1327.311692][T17060] ? madvise_pageout_page_range.isra.0+0x120/0x120 [ 1327.311705][T17060] ? __kasan_check_write+0x14/0x20 [ 1327.311717][T17060] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1327.311732][T17060] ? vmacache_update+0x114/0x140 [ 1327.311747][T17060] ? find_vma+0x30/0x170 [ 1327.311764][T17060] __x64_sys_madvise+0x719/0x1500 [ 1327.311790][T17060] ? madvise_free_pte_range+0x2580/0x2580 [ 1327.423735][T17060] ? 0xffffffff81000000 [ 1327.427910][T17060] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1327.433994][T17060] ? trace_hardirqs_off_caller+0x65/0x230 [ 1327.439733][T17060] do_syscall_64+0xfa/0x760 [ 1327.444257][T17060] ? do_syscall_64+0xfa/0x760 [ 1327.448951][T17060] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1327.454854][T17060] RIP: 0033:0x459829 [ 1327.458755][T17060] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1327.478369][T17060] RSP: 002b:00007f55d1024c78 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 1327.486795][T17060] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 1327.494785][T17060] RDX: 0000000000000015 RSI: 0000000000600000 RDI: 00000000200d9000 [ 1327.502763][T17060] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1327.510797][T17060] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55d10256d4 [ 1327.510807][T17060] R13: 00000000004c5c85 R14: 00000000004da530 R15: 00000000ffffffff [ 1327.510821][T17060] Modules linked in: [ 1327.514917][T17089] kobject: 'loop1' (00000000b37ead23): kobject_uevent_env [ 1327.514953][T17089] kobject: 'loop1' (00000000b37ead23): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1327.547949][T17060] ---[ end trace 1baf486458379a5c ]--- [ 1327.547975][T17060] RIP: 0010:shrink_page_list+0x2872/0x5430 [ 1327.547991][T17060] Code: d9 ea ff ff e8 5f 26 dd ff 4c 8d 6b ff e9 1c db ff ff e8 51 26 dd ff 48 8b bd 10 ff ff ff 48 c7 c6 00 88 93 87 e8 0e 12 07 00 <0f> 0b e8 37 26 dd ff be 08 00 00 00 4c 89 ef e8 fa f3 17 00 4c 89 [ 1327.547999][T17060] RSP: 0018:ffff8880676ff598 EFLAGS: 00010246 [ 1327.548011][T17060] RAX: 0000000000040000 RBX: 0000000000000020 RCX: ffffc900109de000 [ 1327.548020][T17060] RDX: 0000000000040000 RSI: ffffffff819c1f07 RDI: ffffed100cedfe97 [ 1327.548029][T17060] RBP: ffff8880676ff730 R08: 0000000000000021 R09: ffffed1015d060d9 [ 1327.548038][T17060] R10: ffffed1015d060d8 R11: ffff8880ae8306c7 R12: dffffc0000000000 [ 1327.548047][T17060] R13: ffffea0000e2b640 R14: 0000000000000000 R15: ffffea0000e2b648 [ 1327.548059][T17060] FS: 00007f55d1025700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1327.548069][T17060] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1327.548077][T17060] CR2: 0000001b2c924000 CR3: 000000008ff77000 CR4: 00000000001406f0 [ 1327.548090][T17060] Kernel panic - not syncing: Fatal exception [ 1327.549292][T17060] Kernel Offset: disabled [ 1327.700282][T17060] Rebooting in 86400 seconds..