Starting OpenBSD Secure Shell server... Starting getty on tty2-tty6 if dbus and logind are not available... Starting Permit User Sessions... Starting System Logging Service... [ OK ] Found device /dev/ttyS0. [ 62.426794][ T8086] sshd (8086) used greatest stack depth: 22984 bytes left [ OK ] Started Permit User Sessions. [ OK ] Started System Logging Service. [ OK ] Started OpenBSD Secure Shell server. [ OK ] Started getty on tty2-tty6 if dbus and logind are not available. [ OK ] Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. [ OK ] Started Getty on tty6. [ OK ] Started Getty on tty5. [ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Warning: Permanently added '10.128.0.208' (ECDSA) to the list of known hosts. 2021/03/04 01:37:13 fuzzer started Debian GNU/Linux 9 syzkaller ttyS0 2021/03/04 01:37:14 dialing manager at 10.128.0.169:42097 2021/03/04 01:37:14 syscalls: 3539 2021/03/04 01:37:14 code coverage: enabled 2021/03/04 01:37:14 comparison tracing: enabled 2021/03/04 01:37:14 extra coverage: enabled 2021/03/04 01:37:14 setuid sandbox: enabled 2021/03/04 01:37:14 namespace sandbox: enabled 2021/03/04 01:37:14 Android sandbox: enabled 2021/03/04 01:37:14 fault injection: enabled 2021/03/04 01:37:14 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/03/04 01:37:14 net packet injection: enabled 2021/03/04 01:37:14 net device setup: enabled 2021/03/04 01:37:14 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/03/04 01:37:14 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/03/04 01:37:14 USB emulation: enabled 2021/03/04 01:37:14 hci packet injection: enabled 2021/03/04 01:37:14 wifi device emulation: enabled 2021/03/04 01:37:14 802.15.4 emulation: enabled 2021/03/04 01:37:14 fetching corpus: 0, signal 0/2000 (executing program) 2021/03/04 01:37:14 fetching corpus: 50, signal 71665/75409 (executing program) 2021/03/04 01:37:14 fetching corpus: 100, signal 95462/100970 (executing program) 2021/03/04 01:37:15 fetching corpus: 150, signal 116500/123713 (executing program) 2021/03/04 01:37:15 fetching corpus: 200, signal 143772/152563 (executing program) 2021/03/04 01:37:15 fetching corpus: 250, signal 156571/166990 (executing program) 2021/03/04 01:37:15 fetching corpus: 300, signal 178565/190491 (executing program) 2021/03/04 01:37:15 fetching corpus: 350, signal 187926/201477 (executing program) 2021/03/04 01:37:15 fetching corpus: 400, signal 197349/212483 (executing program) 2021/03/04 01:37:15 fetching corpus: 450, signal 207974/224627 (executing program) 2021/03/04 01:37:15 fetching corpus: 500, signal 216566/234759 (executing program) 2021/03/04 01:37:16 fetching corpus: 550, signal 234324/253803 (executing program) 2021/03/04 01:37:16 fetching corpus: 600, signal 239903/260873 (executing program) 2021/03/04 01:37:16 fetching corpus: 650, signal 247137/269567 (executing program) 2021/03/04 01:37:16 fetching corpus: 700, signal 257408/281179 (executing program) 2021/03/04 01:37:16 fetching corpus: 750, signal 262724/287959 (executing program) 2021/03/04 01:37:16 fetching corpus: 800, signal 272439/298999 (executing program) 2021/03/04 01:37:16 fetching corpus: 850, signal 281406/309218 (executing program) 2021/03/04 01:37:17 fetching corpus: 900, signal 290342/319438 (executing program) 2021/03/04 01:37:17 fetching corpus: 950, signal 299928/330252 (executing program) 2021/03/04 01:37:17 fetching corpus: 1000, signal 309120/340607 (executing program) 2021/03/04 01:37:17 fetching corpus: 1050, signal 316260/349018 (executing program) 2021/03/04 01:37:17 fetching corpus: 1100, signal 322369/356401 (executing program) 2021/03/04 01:37:17 fetching corpus: 1150, signal 329798/364996 (executing program) 2021/03/04 01:37:17 fetching corpus: 1200, signal 336223/372594 (executing program) 2021/03/04 01:37:18 fetching corpus: 1250, signal 341957/379565 (executing program) 2021/03/04 01:37:18 fetching corpus: 1300, signal 347643/386493 (executing program) 2021/03/04 01:37:18 fetching corpus: 1350, signal 352596/392662 (executing program) 2021/03/04 01:37:18 fetching corpus: 1400, signal 357157/398439 (executing program) 2021/03/04 01:37:18 fetching corpus: 1450, signal 363164/405592 (executing program) 2021/03/04 01:37:18 fetching corpus: 1500, signal 369803/413311 (executing program) 2021/03/04 01:37:18 fetching corpus: 1550, signal 374501/419172 (executing program) 2021/03/04 01:37:18 fetching corpus: 1600, signal 379829/425628 (executing program) 2021/03/04 01:37:19 fetching corpus: 1650, signal 385432/432314 (executing program) 2021/03/04 01:37:19 fetching corpus: 1700, signal 390891/438832 (executing program) 2021/03/04 01:37:19 fetching corpus: 1750, signal 393910/443022 (executing program) 2021/03/04 01:37:19 fetching corpus: 1800, signal 396960/447295 (executing program) 2021/03/04 01:37:19 fetching corpus: 1850, signal 399271/450803 (executing program) 2021/03/04 01:37:19 fetching corpus: 1900, signal 405129/457612 (executing program) 2021/03/04 01:37:19 fetching corpus: 1950, signal 408827/462374 (executing program) 2021/03/04 01:37:20 fetching corpus: 2000, signal 411896/466579 (executing program) 2021/03/04 01:37:20 fetching corpus: 2050, signal 416916/472542 (executing program) 2021/03/04 01:37:20 fetching corpus: 2100, signal 420180/476874 (executing program) 2021/03/04 01:37:20 fetching corpus: 2150, signal 422780/480619 (executing program) 2021/03/04 01:37:20 fetching corpus: 2200, signal 428062/486825 (executing program) 2021/03/04 01:37:20 fetching corpus: 2250, signal 431191/490961 (executing program) 2021/03/04 01:37:20 fetching corpus: 2300, signal 434651/495484 (executing program) 2021/03/04 01:37:21 fetching corpus: 2350, signal 438122/499978 (executing program) 2021/03/04 01:37:21 fetching corpus: 2400, signal 442517/505302 (executing program) 2021/03/04 01:37:21 fetching corpus: 2450, signal 447301/510987 (executing program) 2021/03/04 01:37:21 fetching corpus: 2500, signal 449671/514433 (executing program) 2021/03/04 01:37:21 fetching corpus: 2550, signal 453359/519067 (executing program) 2021/03/04 01:37:21 fetching corpus: 2600, signal 455657/522481 (executing program) 2021/03/04 01:37:21 fetching corpus: 2650, signal 462373/529916 (executing program) 2021/03/04 01:37:22 fetching corpus: 2700, signal 465109/533668 (executing program) 2021/03/04 01:37:22 fetching corpus: 2750, signal 469138/538574 (executing program) 2021/03/04 01:37:22 fetching corpus: 2800, signal 473958/544186 (executing program) 2021/03/04 01:37:22 fetching corpus: 2850, signal 478010/549065 (executing program) 2021/03/04 01:37:22 fetching corpus: 2900, signal 481290/553198 (executing program) 2021/03/04 01:37:22 fetching corpus: 2950, signal 484172/557033 (executing program) 2021/03/04 01:37:22 fetching corpus: 3000, signal 488322/562006 (executing program) 2021/03/04 01:37:22 fetching corpus: 3050, signal 491750/566284 (executing program) 2021/03/04 01:37:23 fetching corpus: 3100, signal 494636/570033 (executing program) 2021/03/04 01:37:23 fetching corpus: 3150, signal 498041/574244 (executing program) 2021/03/04 01:37:23 fetching corpus: 3200, signal 502754/579657 (executing program) 2021/03/04 01:37:23 fetching corpus: 3250, signal 505069/582943 (executing program) 2021/03/04 01:37:23 fetching corpus: 3300, signal 508222/586892 (executing program) 2021/03/04 01:37:23 fetching corpus: 3350, signal 510240/589882 (executing program) 2021/03/04 01:37:24 fetching corpus: 3400, signal 512474/593010 (executing program) 2021/03/04 01:37:24 fetching corpus: 3450, signal 514703/596138 (executing program) 2021/03/04 01:37:24 fetching corpus: 3500, signal 517317/599581 (executing program) 2021/03/04 01:37:24 fetching corpus: 3550, signal 520973/604047 (executing program) 2021/03/04 01:37:24 fetching corpus: 3600, signal 523642/607557 (executing program) 2021/03/04 01:37:24 fetching corpus: 3650, signal 526051/610865 (executing program) 2021/03/04 01:37:24 fetching corpus: 3700, signal 527714/613534 (executing program) 2021/03/04 01:37:24 fetching corpus: 3750, signal 529783/616504 (executing program) 2021/03/04 01:37:25 fetching corpus: 3800, signal 533372/620776 (executing program) 2021/03/04 01:37:25 fetching corpus: 3850, signal 536162/624391 (executing program) 2021/03/04 01:37:25 fetching corpus: 3900, signal 538947/627986 (executing program) 2021/03/04 01:37:25 fetching corpus: 3950, signal 541656/631488 (executing program) 2021/03/04 01:37:25 fetching corpus: 4000, signal 543657/634350 (executing program) 2021/03/04 01:37:25 fetching corpus: 4050, signal 546579/638021 (executing program) 2021/03/04 01:37:25 fetching corpus: 4100, signal 549262/641467 (executing program) 2021/03/04 01:37:25 fetching corpus: 4150, signal 551074/644183 (executing program) 2021/03/04 01:37:26 fetching corpus: 4200, signal 553115/647079 (executing program) 2021/03/04 01:37:26 fetching corpus: 4250, signal 554532/649406 (executing program) 2021/03/04 01:37:26 fetching corpus: 4300, signal 556630/652309 (executing program) 2021/03/04 01:37:26 fetching corpus: 4350, signal 558759/655236 (executing program) 2021/03/04 01:37:26 fetching corpus: 4400, signal 561571/658780 (executing program) 2021/03/04 01:37:26 fetching corpus: 4450, signal 563829/661811 (executing program) 2021/03/04 01:37:26 fetching corpus: 4500, signal 566278/665037 (executing program) 2021/03/04 01:37:27 fetching corpus: 4550, signal 568777/668243 (executing program) 2021/03/04 01:37:27 fetching corpus: 4600, signal 571516/671638 (executing program) 2021/03/04 01:37:27 fetching corpus: 4650, signal 573238/674215 (executing program) 2021/03/04 01:37:27 fetching corpus: 4700, signal 575817/677522 (executing program) 2021/03/04 01:37:27 fetching corpus: 4750, signal 579224/681471 (executing program) 2021/03/04 01:37:27 fetching corpus: 4800, signal 581708/684663 (executing program) 2021/03/04 01:37:27 fetching corpus: 4850, signal 583964/687609 (executing program) 2021/03/04 01:37:28 fetching corpus: 4900, signal 586306/690581 (executing program) 2021/03/04 01:37:28 fetching corpus: 4950, signal 588512/693462 (executing program) 2021/03/04 01:37:28 fetching corpus: 5000, signal 591532/696997 (executing program) 2021/03/04 01:37:28 fetching corpus: 5050, signal 593674/699819 (executing program) 2021/03/04 01:37:28 fetching corpus: 5100, signal 595275/702162 (executing program) 2021/03/04 01:37:28 fetching corpus: 5150, signal 597281/704919 (executing program) 2021/03/04 01:37:28 fetching corpus: 5200, signal 599487/707804 (executing program) 2021/03/04 01:37:28 fetching corpus: 5250, signal 601224/710259 (executing program) 2021/03/04 01:37:29 fetching corpus: 5300, signal 603045/712831 (executing program) 2021/03/04 01:37:29 fetching corpus: 5350, signal 605384/715750 (executing program) 2021/03/04 01:37:29 fetching corpus: 5400, signal 606341/717573 (executing program) 2021/03/04 01:37:29 fetching corpus: 5450, signal 608594/720426 (executing program) 2021/03/04 01:37:29 fetching corpus: 5500, signal 609976/722591 (executing program) 2021/03/04 01:37:29 fetching corpus: 5550, signal 611853/725186 (executing program) 2021/03/04 01:37:29 fetching corpus: 5600, signal 613346/727437 (executing program) 2021/03/04 01:37:29 fetching corpus: 5650, signal 615826/730455 (executing program) 2021/03/04 01:37:30 fetching corpus: 5700, signal 617739/732987 (executing program) 2021/03/04 01:37:30 fetching corpus: 5750, signal 619652/735536 (executing program) 2021/03/04 01:37:30 fetching corpus: 5800, signal 621684/738171 (executing program) 2021/03/04 01:37:30 fetching corpus: 5850, signal 623325/740492 (executing program) 2021/03/04 01:37:30 fetching corpus: 5900, signal 625087/742958 (executing program) 2021/03/04 01:37:30 fetching corpus: 5950, signal 626861/745381 (executing program) 2021/03/04 01:37:31 fetching corpus: 6000, signal 629279/748315 (executing program) 2021/03/04 01:37:31 fetching corpus: 6050, signal 630381/750225 (executing program) 2021/03/04 01:37:31 fetching corpus: 6100, signal 632217/752700 (executing program) 2021/03/04 01:37:31 fetching corpus: 6150, signal 634051/755127 (executing program) 2021/03/04 01:37:31 fetching corpus: 6200, signal 636022/757658 (executing program) 2021/03/04 01:37:31 fetching corpus: 6250, signal 638303/760424 (executing program) 2021/03/04 01:37:31 fetching corpus: 6300, signal 639901/762637 (executing program) 2021/03/04 01:37:31 fetching corpus: 6350, signal 641653/764932 (executing program) 2021/03/04 01:37:32 fetching corpus: 6400, signal 643160/767079 (executing program) 2021/03/04 01:37:32 fetching corpus: 6450, signal 644409/768986 (executing program) 2021/03/04 01:37:32 fetching corpus: 6500, signal 646177/771320 (executing program) 2021/03/04 01:37:32 fetching corpus: 6550, signal 647799/773550 (executing program) 2021/03/04 01:37:32 fetching corpus: 6600, signal 649682/775945 (executing program) 2021/03/04 01:37:32 fetching corpus: 6650, signal 650914/777855 (executing program) 2021/03/04 01:37:32 fetching corpus: 6700, signal 653010/780468 (executing program) 2021/03/04 01:37:32 fetching corpus: 6750, signal 654318/782460 (executing program) 2021/03/04 01:37:32 fetching corpus: 6800, signal 656082/784769 (executing program) 2021/03/04 01:37:33 fetching corpus: 6850, signal 658144/787286 (executing program) 2021/03/04 01:37:33 fetching corpus: 6900, signal 659842/789536 (executing program) 2021/03/04 01:37:33 fetching corpus: 6950, signal 661714/791898 (executing program) 2021/03/04 01:37:33 fetching corpus: 7000, signal 663064/793876 (executing program) 2021/03/04 01:37:33 fetching corpus: 7050, signal 664662/796042 (executing program) 2021/03/04 01:37:33 fetching corpus: 7100, signal 665969/797970 (executing program) 2021/03/04 01:37:33 fetching corpus: 7150, signal 667168/799829 (executing program) 2021/03/04 01:37:33 fetching corpus: 7200, signal 669184/802295 (executing program) 2021/03/04 01:37:34 fetching corpus: 7250, signal 670486/804191 (executing program) 2021/03/04 01:37:34 fetching corpus: 7300, signal 672496/806624 (executing program) 2021/03/04 01:37:34 fetching corpus: 7350, signal 674152/808763 (executing program) 2021/03/04 01:37:34 fetching corpus: 7400, signal 675984/811070 (executing program) 2021/03/04 01:37:34 fetching corpus: 7450, signal 677258/812977 (executing program) 2021/03/04 01:37:34 fetching corpus: 7500, signal 678335/814713 (executing program) 2021/03/04 01:37:34 fetching corpus: 7550, signal 680032/816931 (executing program) 2021/03/04 01:37:34 fetching corpus: 7600, signal 681323/818828 (executing program) 2021/03/04 01:37:35 fetching corpus: 7650, signal 683647/821501 (executing program) 2021/03/04 01:37:35 fetching corpus: 7700, signal 684618/823147 (executing program) 2021/03/04 01:37:35 fetching corpus: 7750, signal 686104/825146 (executing program) 2021/03/04 01:37:35 fetching corpus: 7800, signal 687328/826974 (executing program) 2021/03/04 01:37:35 fetching corpus: 7850, signal 689081/829160 (executing program) 2021/03/04 01:37:35 fetching corpus: 7900, signal 690320/830978 (executing program) 2021/03/04 01:37:35 fetching corpus: 7950, signal 691708/832900 (executing program) 2021/03/04 01:37:36 fetching corpus: 8000, signal 692794/834593 (executing program) 2021/03/04 01:37:36 fetching corpus: 8050, signal 694122/836475 (executing program) 2021/03/04 01:37:36 fetching corpus: 8100, signal 695122/838040 (executing program) 2021/03/04 01:37:36 fetching corpus: 8150, signal 697496/840653 (executing program) 2021/03/04 01:37:36 fetching corpus: 8200, signal 698454/842207 (executing program) 2021/03/04 01:37:36 fetching corpus: 8250, signal 699884/844159 (executing program) 2021/03/04 01:37:36 fetching corpus: 8300, signal 701332/846081 (executing program) 2021/03/04 01:37:36 fetching corpus: 8350, signal 703470/848497 (executing program) 2021/03/04 01:37:37 fetching corpus: 8400, signal 704636/850199 (executing program) 2021/03/04 01:37:37 fetching corpus: 8450, signal 706018/852111 (executing program) 2021/03/04 01:37:37 fetching corpus: 8500, signal 707140/853813 (executing program) 2021/03/04 01:37:37 fetching corpus: 8550, signal 708319/855546 (executing program) 2021/03/04 01:37:37 fetching corpus: 8600, signal 710072/857680 (executing program) 2021/03/04 01:37:37 fetching corpus: 8650, signal 711793/859798 (executing program) 2021/03/04 01:37:38 fetching corpus: 8700, signal 712848/861377 (executing program) 2021/03/04 01:37:38 fetching corpus: 8750, signal 715072/863847 (executing program) 2021/03/04 01:37:38 fetching corpus: 8800, signal 716312/865637 (executing program) 2021/03/04 01:37:38 fetching corpus: 8850, signal 718104/867802 (executing program) 2021/03/04 01:37:38 fetching corpus: 8900, signal 719268/869486 (executing program) 2021/03/04 01:37:38 fetching corpus: 8950, signal 720495/871208 (executing program) 2021/03/04 01:37:38 fetching corpus: 9000, signal 721859/873010 (executing program) 2021/03/04 01:37:38 fetching corpus: 9050, signal 722817/874573 (executing program) 2021/03/04 01:37:39 fetching corpus: 9100, signal 723960/876187 (executing program) 2021/03/04 01:37:39 fetching corpus: 9150, signal 725471/878088 (executing program) 2021/03/04 01:37:39 fetching corpus: 9200, signal 727168/880082 (executing program) 2021/03/04 01:37:39 fetching corpus: 9250, signal 728140/881543 (executing program) 2021/03/04 01:37:39 fetching corpus: 9300, signal 729479/883283 (executing program) 2021/03/04 01:37:39 fetching corpus: 9350, signal 730351/884731 (executing program) 2021/03/04 01:37:39 fetching corpus: 9399, signal 731537/886330 (executing program) 2021/03/04 01:37:40 fetching corpus: 9449, signal 732791/888020 (executing program) 2021/03/04 01:37:40 fetching corpus: 9499, signal 733756/889542 (executing program) 2021/03/04 01:37:40 fetching corpus: 9549, signal 734904/891132 (executing program) 2021/03/04 01:37:40 fetching corpus: 9599, signal 736762/893207 (executing program) 2021/03/04 01:37:40 fetching corpus: 9649, signal 738711/895355 (executing program) 2021/03/04 01:37:40 fetching corpus: 9699, signal 740267/897192 (executing program) 2021/03/04 01:37:40 fetching corpus: 9749, signal 741880/899033 (executing program) 2021/03/04 01:37:40 fetching corpus: 9799, signal 744328/901497 (executing program) 2021/03/04 01:37:41 fetching corpus: 9849, signal 745543/903107 (executing program) 2021/03/04 01:37:41 fetching corpus: 9899, signal 747055/904962 (executing program) 2021/03/04 01:37:41 fetching corpus: 9949, signal 748897/907001 (executing program) 2021/03/04 01:37:41 fetching corpus: 9999, signal 749963/908442 (executing program) 2021/03/04 01:37:41 fetching corpus: 10049, signal 752106/910691 (executing program) 2021/03/04 01:37:41 fetching corpus: 10099, signal 753647/912508 (executing program) 2021/03/04 01:37:41 fetching corpus: 10149, signal 754737/913988 (executing program) 2021/03/04 01:37:42 fetching corpus: 10199, signal 756082/915714 (executing program) 2021/03/04 01:37:42 fetching corpus: 10249, signal 757218/917229 (executing program) 2021/03/04 01:37:42 fetching corpus: 10299, signal 758459/918821 (executing program) 2021/03/04 01:37:42 fetching corpus: 10349, signal 759325/920152 (executing program) 2021/03/04 01:37:42 fetching corpus: 10399, signal 760959/922039 (executing program) 2021/03/04 01:37:42 fetching corpus: 10449, signal 762407/923774 (executing program) 2021/03/04 01:37:42 fetching corpus: 10499, signal 763933/925537 (executing program) 2021/03/04 01:37:43 fetching corpus: 10549, signal 764942/926956 (executing program) 2021/03/04 01:37:43 fetching corpus: 10599, signal 766618/928801 (executing program) 2021/03/04 01:37:43 fetching corpus: 10649, signal 767500/930146 (executing program) 2021/03/04 01:37:43 fetching corpus: 10699, signal 768909/931812 (executing program) 2021/03/04 01:37:43 fetching corpus: 10749, signal 769907/933221 (executing program) 2021/03/04 01:37:43 fetching corpus: 10799, signal 770830/934611 (executing program) 2021/03/04 01:37:43 fetching corpus: 10849, signal 772263/936278 (executing program) 2021/03/04 01:37:44 fetching corpus: 10899, signal 773542/937846 (executing program) 2021/03/04 01:37:44 fetching corpus: 10949, signal 775007/939527 (executing program) 2021/03/04 01:37:44 fetching corpus: 10999, signal 775850/940818 (executing program) 2021/03/04 01:37:44 fetching corpus: 11049, signal 777326/942528 (executing program) 2021/03/04 01:37:44 fetching corpus: 11099, signal 778289/943914 (executing program) 2021/03/04 01:37:44 fetching corpus: 11149, signal 779355/945332 (executing program) 2021/03/04 01:37:44 fetching corpus: 11199, signal 780362/946703 (executing program) 2021/03/04 01:37:45 fetching corpus: 11249, signal 781214/947957 (executing program) 2021/03/04 01:37:45 fetching corpus: 11299, signal 782542/949566 (executing program) 2021/03/04 01:37:45 fetching corpus: 11349, signal 784411/951470 (executing program) 2021/03/04 01:37:45 fetching corpus: 11399, signal 785825/953072 (executing program) 2021/03/04 01:37:45 fetching corpus: 11449, signal 787280/954722 (executing program) 2021/03/04 01:37:45 fetching corpus: 11499, signal 788290/956090 (executing program) 2021/03/04 01:37:45 fetching corpus: 11549, signal 789210/957442 (executing program) 2021/03/04 01:37:45 fetching corpus: 11599, signal 790346/958855 (executing program) 2021/03/04 01:37:46 fetching corpus: 11649, signal 791013/960005 (executing program) 2021/03/04 01:37:46 fetching corpus: 11699, signal 791788/961178 (executing program) 2021/03/04 01:37:46 fetching corpus: 11749, signal 792647/962430 (executing program) 2021/03/04 01:37:46 fetching corpus: 11799, signal 793506/963660 (executing program) 2021/03/04 01:37:46 fetching corpus: 11849, signal 794351/964912 (executing program) 2021/03/04 01:37:46 fetching corpus: 11899, signal 795081/966069 (executing program) 2021/03/04 01:37:46 fetching corpus: 11949, signal 796137/967457 (executing program) 2021/03/04 01:37:46 fetching corpus: 11999, signal 797185/968779 (executing program) 2021/03/04 01:37:47 fetching corpus: 12049, signal 798660/970411 (executing program) 2021/03/04 01:37:47 fetching corpus: 12099, signal 799542/971658 (executing program) 2021/03/04 01:37:47 fetching corpus: 12149, signal 800336/972853 (executing program) 2021/03/04 01:37:47 fetching corpus: 12199, signal 800935/973960 (executing program) 2021/03/04 01:37:47 fetching corpus: 12249, signal 802020/975348 (executing program) 2021/03/04 01:37:47 fetching corpus: 12299, signal 802804/976557 (executing program) 2021/03/04 01:37:47 fetching corpus: 12349, signal 803724/977817 (executing program) 2021/03/04 01:37:48 fetching corpus: 12399, signal 804511/979006 (executing program) 2021/03/04 01:37:48 fetching corpus: 12449, signal 805511/980267 (executing program) 2021/03/04 01:37:48 fetching corpus: 12499, signal 806211/981370 (executing program) 2021/03/04 01:37:48 fetching corpus: 12549, signal 807167/982626 (executing program) 2021/03/04 01:37:48 fetching corpus: 12599, signal 808606/984167 (executing program) 2021/03/04 01:37:48 fetching corpus: 12649, signal 809536/985387 (executing program) 2021/03/04 01:37:48 fetching corpus: 12699, signal 810725/986758 (executing program) 2021/03/04 01:37:49 fetching corpus: 12749, signal 811614/987941 (executing program) 2021/03/04 01:37:49 fetching corpus: 12799, signal 812652/989254 (executing program) 2021/03/04 01:37:49 fetching corpus: 12849, signal 813740/990597 (executing program) 2021/03/04 01:37:49 fetching corpus: 12899, signal 815212/992127 (executing program) 2021/03/04 01:37:49 fetching corpus: 12949, signal 815829/993163 (executing program) 2021/03/04 01:37:49 fetching corpus: 12999, signal 816876/994439 (executing program) 2021/03/04 01:37:49 fetching corpus: 13049, signal 817733/995605 (executing program) 2021/03/04 01:37:49 fetching corpus: 13099, signal 818470/996662 (executing program) 2021/03/04 01:37:50 fetching corpus: 13149, signal 819272/997804 (executing program) 2021/03/04 01:37:50 fetching corpus: 13199, signal 820039/998912 (executing program) 2021/03/04 01:37:50 fetching corpus: 13249, signal 820917/1000110 (executing program) 2021/03/04 01:37:50 fetching corpus: 13299, signal 822094/1001464 (executing program) 2021/03/04 01:37:50 fetching corpus: 13349, signal 823024/1002651 (executing program) 2021/03/04 01:37:50 fetching corpus: 13399, signal 823792/1003704 (executing program) 2021/03/04 01:37:50 fetching corpus: 13449, signal 824725/1004872 (executing program) 2021/03/04 01:37:50 fetching corpus: 13499, signal 825792/1006152 (executing program) 2021/03/04 01:37:51 fetching corpus: 13549, signal 826695/1007376 (executing program) 2021/03/04 01:37:51 fetching corpus: 13599, signal 827457/1008446 (executing program) 2021/03/04 01:37:51 fetching corpus: 13649, signal 828457/1009735 (executing program) 2021/03/04 01:37:51 fetching corpus: 13699, signal 829715/1011067 (executing program) 2021/03/04 01:37:51 fetching corpus: 13749, signal 830705/1012290 (executing program) 2021/03/04 01:37:51 fetching corpus: 13799, signal 831179/1013204 (executing program) 2021/03/04 01:37:51 fetching corpus: 13849, signal 832139/1014373 (executing program) 2021/03/04 01:37:51 fetching corpus: 13899, signal 833150/1015611 (executing program) 2021/03/04 01:37:51 fetching corpus: 13949, signal 834613/1017068 (executing program) 2021/03/04 01:37:52 fetching corpus: 13999, signal 835457/1018196 (executing program) 2021/03/04 01:37:52 fetching corpus: 14049, signal 836310/1019311 (executing program) 2021/03/04 01:37:52 fetching corpus: 14099, signal 837162/1020459 (executing program) 2021/03/04 01:37:52 fetching corpus: 14149, signal 837916/1021517 (executing program) 2021/03/04 01:37:52 fetching corpus: 14199, signal 838683/1022610 (executing program) 2021/03/04 01:37:52 fetching corpus: 14249, signal 839433/1023653 (executing program) 2021/03/04 01:37:52 fetching corpus: 14299, signal 840764/1025076 (executing program) 2021/03/04 01:37:53 fetching corpus: 14349, signal 841772/1026250 (executing program) 2021/03/04 01:37:53 fetching corpus: 14399, signal 842866/1027453 (executing program) 2021/03/04 01:37:53 fetching corpus: 14449, signal 843623/1028541 (executing program) 2021/03/04 01:37:53 fetching corpus: 14499, signal 844127/1029443 (executing program) 2021/03/04 01:37:53 fetching corpus: 14549, signal 844675/1030391 (executing program) 2021/03/04 01:37:54 fetching corpus: 14599, signal 845843/1031643 (executing program) 2021/03/04 01:37:54 fetching corpus: 14649, signal 846740/1032738 (executing program) 2021/03/04 01:37:54 fetching corpus: 14699, signal 847747/1033853 (executing program) 2021/03/04 01:37:54 fetching corpus: 14749, signal 848756/1035000 (executing program) 2021/03/04 01:37:54 fetching corpus: 14799, signal 849748/1036190 (executing program) 2021/03/04 01:37:54 fetching corpus: 14849, signal 851085/1037542 (executing program) 2021/03/04 01:37:54 fetching corpus: 14899, signal 851950/1038608 (executing program) 2021/03/04 01:37:55 fetching corpus: 14949, signal 853314/1039887 (executing program) 2021/03/04 01:37:55 fetching corpus: 14999, signal 854201/1040959 (executing program) 2021/03/04 01:37:55 fetching corpus: 15049, signal 855017/1042024 (executing program) 2021/03/04 01:37:55 fetching corpus: 15099, signal 855574/1042909 (executing program) 2021/03/04 01:37:55 fetching corpus: 15149, signal 856075/1043755 (executing program) 2021/03/04 01:37:55 fetching corpus: 15199, signal 856886/1044796 (executing program) 2021/03/04 01:37:55 fetching corpus: 15249, signal 857397/1045680 (executing program) 2021/03/04 01:37:55 fetching corpus: 15299, signal 857969/1046558 (executing program) 2021/03/04 01:37:56 fetching corpus: 15349, signal 859216/1047788 (executing program) 2021/03/04 01:37:56 fetching corpus: 15399, signal 860097/1048865 (executing program) 2021/03/04 01:37:56 fetching corpus: 15449, signal 860790/1049847 (executing program) 2021/03/04 01:37:56 fetching corpus: 15499, signal 861510/1050824 (executing program) 2021/03/04 01:37:56 fetching corpus: 15549, signal 862199/1051779 (executing program) 2021/03/04 01:37:56 fetching corpus: 15599, signal 862748/1052643 (executing program) 2021/03/04 01:37:56 fetching corpus: 15649, signal 863709/1053730 (executing program) 2021/03/04 01:37:56 fetching corpus: 15699, signal 864259/1054664 (executing program) 2021/03/04 01:37:56 fetching corpus: 15749, signal 865222/1055717 (executing program) 2021/03/04 01:37:57 fetching corpus: 15799, signal 866087/1056749 (executing program) 2021/03/04 01:37:57 fetching corpus: 15849, signal 867057/1057822 (executing program) 2021/03/04 01:37:57 fetching corpus: 15899, signal 867809/1058819 (executing program) 2021/03/04 01:37:57 fetching corpus: 15949, signal 868429/1059702 (executing program) 2021/03/04 01:37:57 fetching corpus: 15999, signal 869076/1060568 (executing program) 2021/03/04 01:37:57 fetching corpus: 16049, signal 869806/1061543 (executing program) 2021/03/04 01:37:57 fetching corpus: 16099, signal 870514/1062479 (executing program) 2021/03/04 01:37:57 fetching corpus: 16149, signal 871675/1063646 (executing program) 2021/03/04 01:37:58 fetching corpus: 16199, signal 873501/1065139 (executing program) 2021/03/04 01:37:58 fetching corpus: 16249, signal 874136/1066022 (executing program) 2021/03/04 01:37:58 fetching corpus: 16299, signal 875081/1067073 (executing program) 2021/03/04 01:37:58 fetching corpus: 16349, signal 875704/1067937 (executing program) 2021/03/04 01:37:58 fetching corpus: 16399, signal 876402/1068875 (executing program) 2021/03/04 01:37:58 fetching corpus: 16449, signal 877415/1069906 (executing program) 2021/03/04 01:37:59 fetching corpus: 16499, signal 878686/1071095 (executing program) 2021/03/04 01:37:59 fetching corpus: 16549, signal 879112/1071907 (executing program) 2021/03/04 01:37:59 fetching corpus: 16599, signal 880033/1072925 (executing program) 2021/03/04 01:37:59 fetching corpus: 16649, signal 880775/1073855 (executing program) 2021/03/04 01:37:59 fetching corpus: 16699, signal 881342/1074740 (executing program) 2021/03/04 01:37:59 fetching corpus: 16749, signal 882013/1075661 (executing program) 2021/03/04 01:37:59 fetching corpus: 16799, signal 883352/1076909 (executing program) 2021/03/04 01:38:00 fetching corpus: 16849, signal 884127/1077832 (executing program) 2021/03/04 01:38:00 fetching corpus: 16899, signal 884732/1078734 (executing program) 2021/03/04 01:38:00 fetching corpus: 16949, signal 885420/1079657 (executing program) 2021/03/04 01:38:00 fetching corpus: 16999, signal 886349/1080658 (executing program) 2021/03/04 01:38:00 fetching corpus: 17049, signal 887039/1081503 (executing program) 2021/03/04 01:38:00 fetching corpus: 17099, signal 887756/1082372 (executing program) 2021/03/04 01:38:00 fetching corpus: 17149, signal 888554/1083290 (executing program) 2021/03/04 01:38:00 fetching corpus: 17199, signal 889507/1084304 (executing program) 2021/03/04 01:38:01 fetching corpus: 17249, signal 890155/1085138 (executing program) 2021/03/04 01:38:01 fetching corpus: 17299, signal 890971/1086024 (executing program) 2021/03/04 01:38:01 fetching corpus: 17349, signal 891524/1086838 (executing program) 2021/03/04 01:38:01 fetching corpus: 17399, signal 892153/1087663 (executing program) 2021/03/04 01:38:01 fetching corpus: 17449, signal 893293/1088720 (executing program) 2021/03/04 01:38:01 fetching corpus: 17499, signal 893707/1089419 (executing program) 2021/03/04 01:38:01 fetching corpus: 17549, signal 894406/1090242 (executing program) 2021/03/04 01:38:02 fetching corpus: 17599, signal 895049/1091087 (executing program) 2021/03/04 01:38:02 fetching corpus: 17649, signal 896341/1092153 (executing program) 2021/03/04 01:38:02 fetching corpus: 17699, signal 896858/1092910 (executing program) 2021/03/04 01:38:02 fetching corpus: 17749, signal 897509/1093745 (executing program) 2021/03/04 01:38:02 fetching corpus: 17799, signal 898305/1094608 (executing program) 2021/03/04 01:38:02 fetching corpus: 17849, signal 899134/1095536 (executing program) 2021/03/04 01:38:02 fetching corpus: 17899, signal 899972/1096455 (executing program) 2021/03/04 01:38:03 fetching corpus: 17949, signal 900975/1097438 (executing program) 2021/03/04 01:38:03 fetching corpus: 17999, signal 901829/1098308 (executing program) 2021/03/04 01:38:03 fetching corpus: 18049, signal 902428/1099082 (executing program) 2021/03/04 01:38:03 fetching corpus: 18099, signal 903202/1099947 (executing program) 2021/03/04 01:38:03 fetching corpus: 18149, signal 904200/1100859 (executing program) 2021/03/04 01:38:03 fetching corpus: 18199, signal 904763/1101614 (executing program) 2021/03/04 01:38:03 fetching corpus: 18249, signal 905311/1102374 (executing program) 2021/03/04 01:38:04 fetching corpus: 18299, signal 906251/1103276 (executing program) 2021/03/04 01:38:04 fetching corpus: 18349, signal 906765/1104043 (executing program) 2021/03/04 01:38:04 fetching corpus: 18399, signal 907410/1104850 (executing program) 2021/03/04 01:38:04 fetching corpus: 18449, signal 907994/1105630 (executing program) 2021/03/04 01:38:04 fetching corpus: 18499, signal 908703/1106429 (executing program) 2021/03/04 01:38:04 fetching corpus: 18549, signal 909849/1107418 (executing program) 2021/03/04 01:38:04 fetching corpus: 18599, signal 910457/1108226 (executing program) 2021/03/04 01:38:05 fetching corpus: 18649, signal 911232/1109065 (executing program) 2021/03/04 01:38:05 fetching corpus: 18699, signal 911859/1109837 (executing program) 2021/03/04 01:38:05 fetching corpus: 18749, signal 912561/1110639 (executing program) syzkaller login: [ 132.608279][ T3254] ieee802154 phy0 wpan0: encryption failed: -22 [ 132.614890][ T3254] ieee802154 phy1 wpan1: encryption failed: -22 2021/03/04 01:38:05 fetching corpus: 18799, signal 913427/1111487 (executing program) 2021/03/04 01:38:05 fetching corpus: 18849, signal 914191/1112324 (executing program) 2021/03/04 01:38:05 fetching corpus: 18899, signal 914641/1112993 (executing program) 2021/03/04 01:38:05 fetching corpus: 18949, signal 915347/1113784 (executing program) 2021/03/04 01:38:06 fetching corpus: 18999, signal 916130/1114569 (executing program) 2021/03/04 01:38:06 fetching corpus: 19049, signal 917053/1115446 (executing program) 2021/03/04 01:38:06 fetching corpus: 19099, signal 917519/1116154 (executing program) 2021/03/04 01:38:06 fetching corpus: 19149, signal 918175/1116919 (executing program) 2021/03/04 01:38:06 fetching corpus: 19199, signal 918728/1117667 (executing program) 2021/03/04 01:38:06 fetching corpus: 19249, signal 919346/1118392 (executing program) 2021/03/04 01:38:06 fetching corpus: 19299, signal 919818/1119090 (executing program) 2021/03/04 01:38:06 fetching corpus: 19349, signal 920905/1119957 (executing program) 2021/03/04 01:38:07 fetching corpus: 19399, signal 921465/1120734 (executing program) 2021/03/04 01:38:07 fetching corpus: 19449, signal 922238/1121531 (executing program) 2021/03/04 01:38:07 fetching corpus: 19499, signal 922891/1122309 (executing program) 2021/03/04 01:38:07 fetching corpus: 19549, signal 923359/1122999 (executing program) 2021/03/04 01:38:07 fetching corpus: 19599, signal 928061/1125257 (executing program) 2021/03/04 01:38:07 fetching corpus: 19649, signal 929176/1126180 (executing program) 2021/03/04 01:38:07 fetching corpus: 19699, signal 929899/1126999 (executing program) 2021/03/04 01:38:07 fetching corpus: 19749, signal 930868/1127789 (executing program) 2021/03/04 01:38:07 fetching corpus: 19799, signal 931806/1128617 (executing program) 2021/03/04 01:38:08 fetching corpus: 19849, signal 933052/1129563 (executing program) 2021/03/04 01:38:08 fetching corpus: 19899, signal 933533/1130204 (executing program) 2021/03/04 01:38:08 fetching corpus: 19949, signal 934108/1130909 (executing program) 2021/03/04 01:38:08 fetching corpus: 19999, signal 934836/1131639 (executing program) 2021/03/04 01:38:08 fetching corpus: 20049, signal 935232/1132269 (executing program) 2021/03/04 01:38:08 fetching corpus: 20099, signal 935916/1133024 (executing program) 2021/03/04 01:38:08 fetching corpus: 20149, signal 936477/1133704 (executing program) 2021/03/04 01:38:09 fetching corpus: 20199, signal 937201/1134430 (executing program) 2021/03/04 01:38:09 fetching corpus: 20249, signal 937682/1135060 (executing program) 2021/03/04 01:38:09 fetching corpus: 20299, signal 938042/1135664 (executing program) 2021/03/04 01:38:09 fetching corpus: 20349, signal 938753/1136410 (executing program) 2021/03/04 01:38:09 fetching corpus: 20399, signal 939528/1137146 (executing program) 2021/03/04 01:38:09 fetching corpus: 20449, signal 940189/1137848 (executing program) 2021/03/04 01:38:09 fetching corpus: 20499, signal 941639/1138814 (executing program) 2021/03/04 01:38:09 fetching corpus: 20549, signal 942205/1139462 (executing program) 2021/03/04 01:38:10 fetching corpus: 20599, signal 943271/1140264 (executing program) 2021/03/04 01:38:10 fetching corpus: 20649, signal 943958/1140976 (executing program) 2021/03/04 01:38:10 fetching corpus: 20699, signal 944511/1141638 (executing program) 2021/03/04 01:38:10 fetching corpus: 20749, signal 945157/1142308 (executing program) 2021/03/04 01:38:10 fetching corpus: 20799, signal 946325/1143139 (executing program) 2021/03/04 01:38:10 fetching corpus: 20849, signal 946869/1143786 (executing program) 2021/03/04 01:38:10 fetching corpus: 20899, signal 947446/1144432 (executing program) 2021/03/04 01:38:10 fetching corpus: 20949, signal 948057/1145096 (executing program) 2021/03/04 01:38:11 fetching corpus: 20999, signal 948494/1145706 (executing program) 2021/03/04 01:38:11 fetching corpus: 21049, signal 949169/1146398 (executing program) 2021/03/04 01:38:11 fetching corpus: 21099, signal 949654/1147037 (executing program) 2021/03/04 01:38:11 fetching corpus: 21149, signal 950298/1147719 (executing program) 2021/03/04 01:38:11 fetching corpus: 21199, signal 950854/1148409 (executing program) 2021/03/04 01:38:11 fetching corpus: 21249, signal 951701/1149105 (executing program) 2021/03/04 01:38:11 fetching corpus: 21299, signal 952294/1149736 (executing program) 2021/03/04 01:38:11 fetching corpus: 21349, signal 952830/1150336 (executing program) 2021/03/04 01:38:12 fetching corpus: 21399, signal 953775/1151081 (executing program) 2021/03/04 01:38:12 fetching corpus: 21449, signal 954244/1151694 (executing program) 2021/03/04 01:38:12 fetching corpus: 21499, signal 954910/1152336 (executing program) 2021/03/04 01:38:12 fetching corpus: 21549, signal 955496/1152932 (executing program) 2021/03/04 01:38:12 fetching corpus: 21599, signal 956153/1153579 (executing program) 2021/03/04 01:38:12 fetching corpus: 21649, signal 957047/1154325 (executing program) 2021/03/04 01:38:12 fetching corpus: 21699, signal 957496/1154885 (executing program) 2021/03/04 01:38:12 fetching corpus: 21749, signal 958342/1155577 (executing program) 2021/03/04 01:38:12 fetching corpus: 21799, signal 959004/1156203 (executing program) 2021/03/04 01:38:13 fetching corpus: 21849, signal 959671/1156861 (executing program) 2021/03/04 01:38:13 fetching corpus: 21899, signal 960495/1157568 (executing program) 2021/03/04 01:38:13 fetching corpus: 21949, signal 961499/1158321 (executing program) 2021/03/04 01:38:13 fetching corpus: 21999, signal 962000/1158892 (executing program) 2021/03/04 01:38:13 fetching corpus: 22049, signal 962488/1159490 (executing program) 2021/03/04 01:38:13 fetching corpus: 22099, signal 962915/1160044 (executing program) 2021/03/04 01:38:13 fetching corpus: 22149, signal 963433/1160618 (executing program) 2021/03/04 01:38:13 fetching corpus: 22199, signal 964158/1161224 (executing program) 2021/03/04 01:38:13 fetching corpus: 22249, signal 964769/1161807 (executing program) 2021/03/04 01:38:14 fetching corpus: 22299, signal 965356/1162413 (executing program) 2021/03/04 01:38:14 fetching corpus: 22349, signal 965837/1162984 (executing program) 2021/03/04 01:38:14 fetching corpus: 22399, signal 966475/1163578 (executing program) 2021/03/04 01:38:14 fetching corpus: 22449, signal 967005/1164189 (executing program) 2021/03/04 01:38:14 fetching corpus: 22499, signal 967515/1164767 (executing program) 2021/03/04 01:38:14 fetching corpus: 22549, signal 967903/1165323 (executing program) 2021/03/04 01:38:14 fetching corpus: 22599, signal 968368/1165886 (executing program) 2021/03/04 01:38:15 fetching corpus: 22649, signal 969017/1166514 (executing program) 2021/03/04 01:38:15 fetching corpus: 22699, signal 969443/1167085 (executing program) 2021/03/04 01:38:15 fetching corpus: 22749, signal 969963/1167663 (executing program) 2021/03/04 01:38:15 fetching corpus: 22799, signal 970284/1168180 (executing program) 2021/03/04 01:38:15 fetching corpus: 22849, signal 970694/1168719 (executing program) 2021/03/04 01:38:15 fetching corpus: 22899, signal 971403/1169354 (executing program) 2021/03/04 01:38:15 fetching corpus: 22949, signal 972447/1170034 (executing program) 2021/03/04 01:38:15 fetching corpus: 22999, signal 973259/1170674 (executing program) 2021/03/04 01:38:16 fetching corpus: 23049, signal 974057/1171315 (executing program) 2021/03/04 01:38:16 fetching corpus: 23099, signal 974486/1171841 (executing program) 2021/03/04 01:38:16 fetching corpus: 23149, signal 975537/1172548 (executing program) 2021/03/04 01:38:16 fetching corpus: 23199, signal 976251/1173173 (executing program) 2021/03/04 01:38:16 fetching corpus: 23249, signal 976793/1173743 (executing program) 2021/03/04 01:38:16 fetching corpus: 23299, signal 977146/1174241 (executing program) 2021/03/04 01:38:16 fetching corpus: 23349, signal 977588/1174749 (executing program) 2021/03/04 01:38:16 fetching corpus: 23399, signal 978648/1175452 (executing program) 2021/03/04 01:38:16 fetching corpus: 23449, signal 979483/1176060 (executing program) 2021/03/04 01:38:17 fetching corpus: 23499, signal 979875/1176550 (executing program) 2021/03/04 01:38:17 fetching corpus: 23549, signal 980577/1177112 (executing program) 2021/03/04 01:38:17 fetching corpus: 23599, signal 981104/1177614 (executing program) 2021/03/04 01:38:17 fetching corpus: 23649, signal 981529/1178119 (executing program) 2021/03/04 01:38:17 fetching corpus: 23699, signal 982060/1178640 (executing program) 2021/03/04 01:38:17 fetching corpus: 23749, signal 982610/1179152 (executing program) 2021/03/04 01:38:17 fetching corpus: 23799, signal 983064/1179683 (executing program) 2021/03/04 01:38:17 fetching corpus: 23849, signal 983584/1180221 (executing program) 2021/03/04 01:38:18 fetching corpus: 23899, signal 984047/1180736 (executing program) 2021/03/04 01:38:18 fetching corpus: 23949, signal 984849/1181313 (executing program) 2021/03/04 01:38:18 fetching corpus: 23999, signal 985554/1181858 (executing program) 2021/03/04 01:38:18 fetching corpus: 24049, signal 986058/1182398 (executing program) 2021/03/04 01:38:18 fetching corpus: 24099, signal 986613/1182873 (executing program) 2021/03/04 01:38:18 fetching corpus: 24149, signal 987122/1183395 (executing program) 2021/03/04 01:38:18 fetching corpus: 24198, signal 987603/1183895 (executing program) 2021/03/04 01:38:19 fetching corpus: 24247, signal 988093/1184405 (executing program) 2021/03/04 01:38:19 fetching corpus: 24297, signal 988635/1184933 (executing program) 2021/03/04 01:38:19 fetching corpus: 24347, signal 989022/1185416 (executing program) 2021/03/04 01:38:19 fetching corpus: 24397, signal 990197/1186081 (executing program) 2021/03/04 01:38:19 fetching corpus: 24447, signal 991161/1186693 (executing program) 2021/03/04 01:38:19 fetching corpus: 24497, signal 991551/1187134 (executing program) 2021/03/04 01:38:20 fetching corpus: 24547, signal 992027/1187632 (executing program) 2021/03/04 01:38:20 fetching corpus: 24597, signal 993130/1188265 (executing program) 2021/03/04 01:38:20 fetching corpus: 24647, signal 993733/1188814 (executing program) 2021/03/04 01:38:20 fetching corpus: 24697, signal 994451/1189339 (executing program) 2021/03/04 01:38:20 fetching corpus: 24747, signal 995030/1189892 (executing program) 2021/03/04 01:38:20 fetching corpus: 24797, signal 995545/1190393 (executing program) 2021/03/04 01:38:20 fetching corpus: 24847, signal 996127/1190947 (executing program) 2021/03/04 01:38:21 fetching corpus: 24897, signal 996578/1191419 (executing program) 2021/03/04 01:38:21 fetching corpus: 24947, signal 997030/1191878 (executing program) 2021/03/04 01:38:21 fetching corpus: 24997, signal 997630/1192373 (executing program) 2021/03/04 01:38:21 fetching corpus: 25047, signal 998080/1192863 (executing program) 2021/03/04 01:38:21 fetching corpus: 25097, signal 998574/1193339 (executing program) 2021/03/04 01:38:21 fetching corpus: 25147, signal 999018/1193839 (executing program) 2021/03/04 01:38:21 fetching corpus: 25197, signal 999620/1194335 (executing program) 2021/03/04 01:38:21 fetching corpus: 25247, signal 1000067/1194783 (executing program) 2021/03/04 01:38:22 fetching corpus: 25297, signal 1000470/1195262 (executing program) 2021/03/04 01:38:22 fetching corpus: 25347, signal 1001115/1195766 (executing program) 2021/03/04 01:38:22 fetching corpus: 25397, signal 1001728/1196243 (executing program) 2021/03/04 01:38:22 fetching corpus: 25447, signal 1002487/1196742 (executing program) 2021/03/04 01:38:22 fetching corpus: 25497, signal 1003046/1197211 (executing program) 2021/03/04 01:38:22 fetching corpus: 25547, signal 1003369/1197648 (executing program) 2021/03/04 01:38:22 fetching corpus: 25597, signal 1003699/1198079 (executing program) 2021/03/04 01:38:22 fetching corpus: 25647, signal 1004168/1198519 (executing program) 2021/03/04 01:38:23 fetching corpus: 25697, signal 1004778/1198988 (executing program) 2021/03/04 01:38:23 fetching corpus: 25747, signal 1005543/1199498 (executing program) 2021/03/04 01:38:23 fetching corpus: 25797, signal 1006299/1199974 (executing program) 2021/03/04 01:38:23 fetching corpus: 25847, signal 1006675/1200417 (executing program) 2021/03/04 01:38:23 fetching corpus: 25897, signal 1007126/1200843 (executing program) 2021/03/04 01:38:23 fetching corpus: 25947, signal 1007554/1201280 (executing program) 2021/03/04 01:38:23 fetching corpus: 25997, signal 1008489/1201800 (executing program) 2021/03/04 01:38:23 fetching corpus: 26047, signal 1009075/1202230 (executing program) 2021/03/04 01:38:24 fetching corpus: 26097, signal 1009388/1202677 (executing program) 2021/03/04 01:38:24 fetching corpus: 26147, signal 1009865/1203079 (executing program) 2021/03/04 01:38:24 fetching corpus: 26197, signal 1010481/1203547 (executing program) 2021/03/04 01:38:24 fetching corpus: 26247, signal 1011007/1204005 (executing program) 2021/03/04 01:38:24 fetching corpus: 26297, signal 1011631/1204470 (executing program) 2021/03/04 01:38:24 fetching corpus: 26347, signal 1012344/1204954 (executing program) 2021/03/04 01:38:24 fetching corpus: 26397, signal 1012718/1205399 (executing program) 2021/03/04 01:38:24 fetching corpus: 26447, signal 1013487/1205866 (executing program) 2021/03/04 01:38:24 fetching corpus: 26497, signal 1013945/1206321 (executing program) 2021/03/04 01:38:25 fetching corpus: 26547, signal 1014603/1206745 (executing program) 2021/03/04 01:38:25 fetching corpus: 26597, signal 1015070/1207178 (executing program) 2021/03/04 01:38:25 fetching corpus: 26647, signal 1015826/1207620 (executing program) 2021/03/04 01:38:25 fetching corpus: 26697, signal 1016326/1208051 (executing program) 2021/03/04 01:38:25 fetching corpus: 26747, signal 1016721/1208448 (executing program) 2021/03/04 01:38:25 fetching corpus: 26797, signal 1017123/1208848 (executing program) 2021/03/04 01:38:26 fetching corpus: 26847, signal 1017545/1209291 (executing program) 2021/03/04 01:38:26 fetching corpus: 26897, signal 1018069/1209744 (executing program) 2021/03/04 01:38:26 fetching corpus: 26947, signal 1018870/1210188 (executing program) 2021/03/04 01:38:26 fetching corpus: 26997, signal 1019368/1210621 (executing program) 2021/03/04 01:38:26 fetching corpus: 27047, signal 1019817/1211022 (executing program) 2021/03/04 01:38:26 fetching corpus: 27097, signal 1020417/1211433 (executing program) 2021/03/04 01:38:26 fetching corpus: 27147, signal 1020877/1211845 (executing program) 2021/03/04 01:38:26 fetching corpus: 27197, signal 1021163/1212212 (executing program) 2021/03/04 01:38:27 fetching corpus: 27247, signal 1021705/1212664 (executing program) 2021/03/04 01:38:27 fetching corpus: 27297, signal 1022989/1213192 (executing program) 2021/03/04 01:38:27 fetching corpus: 27347, signal 1023475/1213582 (executing program) 2021/03/04 01:38:27 fetching corpus: 27397, signal 1024332/1214039 (executing program) 2021/03/04 01:38:27 fetching corpus: 27447, signal 1025197/1214471 (executing program) 2021/03/04 01:38:27 fetching corpus: 27497, signal 1025609/1214868 (executing program) 2021/03/04 01:38:27 fetching corpus: 27547, signal 1026649/1215301 (executing program) 2021/03/04 01:38:27 fetching corpus: 27597, signal 1026980/1215659 (executing program) 2021/03/04 01:38:28 fetching corpus: 27647, signal 1027469/1216076 (executing program) 2021/03/04 01:38:28 fetching corpus: 27697, signal 1028191/1216515 (executing program) 2021/03/04 01:38:28 fetching corpus: 27747, signal 1028632/1216881 (executing program) 2021/03/04 01:38:28 fetching corpus: 27797, signal 1029060/1217249 (executing program) 2021/03/04 01:38:28 fetching corpus: 27847, signal 1029438/1217654 (executing program) 2021/03/04 01:38:28 fetching corpus: 27897, signal 1029669/1218028 (executing program) 2021/03/04 01:38:28 fetching corpus: 27947, signal 1030231/1218417 (executing program) 2021/03/04 01:38:28 fetching corpus: 27997, signal 1030949/1218818 (executing program) 2021/03/04 01:38:28 fetching corpus: 28047, signal 1031438/1219169 (executing program) 2021/03/04 01:38:29 fetching corpus: 28097, signal 1031771/1219515 (executing program) 2021/03/04 01:38:29 fetching corpus: 28147, signal 1032389/1219896 (executing program) 2021/03/04 01:38:29 fetching corpus: 28197, signal 1032772/1220227 (executing program) 2021/03/04 01:38:29 fetching corpus: 28247, signal 1033234/1220602 (executing program) 2021/03/04 01:38:29 fetching corpus: 28297, signal 1033898/1220978 (executing program) 2021/03/04 01:38:29 fetching corpus: 28347, signal 1034415/1221316 (executing program) 2021/03/04 01:38:29 fetching corpus: 28397, signal 1034713/1221648 (executing program) 2021/03/04 01:38:30 fetching corpus: 28447, signal 1035069/1221997 (executing program) 2021/03/04 01:38:30 fetching corpus: 28497, signal 1035453/1222363 (executing program) 2021/03/04 01:38:30 fetching corpus: 28547, signal 1036036/1222702 (executing program) 2021/03/04 01:38:30 fetching corpus: 28597, signal 1036304/1223076 (executing program) 2021/03/04 01:38:30 fetching corpus: 28647, signal 1036978/1223477 (executing program) 2021/03/04 01:38:30 fetching corpus: 28697, signal 1037801/1223877 (executing program) 2021/03/04 01:38:30 fetching corpus: 28747, signal 1038170/1224190 (executing program) 2021/03/04 01:38:31 fetching corpus: 28797, signal 1038523/1224533 (executing program) 2021/03/04 01:38:31 fetching corpus: 28847, signal 1038894/1224874 (executing program) 2021/03/04 01:38:31 fetching corpus: 28897, signal 1039396/1225221 (executing program) 2021/03/04 01:38:31 fetching corpus: 28947, signal 1039738/1225543 (executing program) 2021/03/04 01:38:31 fetching corpus: 28997, signal 1040199/1225870 (executing program) 2021/03/04 01:38:31 fetching corpus: 29047, signal 1040653/1226228 (executing program) 2021/03/04 01:38:31 fetching corpus: 29097, signal 1041484/1226564 (executing program) 2021/03/04 01:38:32 fetching corpus: 29147, signal 1042227/1226918 (executing program) 2021/03/04 01:38:32 fetching corpus: 29197, signal 1042571/1227234 (executing program) 2021/03/04 01:38:32 fetching corpus: 29247, signal 1043059/1227607 (executing program) 2021/03/04 01:38:32 fetching corpus: 29297, signal 1043507/1227936 (executing program) 2021/03/04 01:38:32 fetching corpus: 29347, signal 1044469/1228293 (executing program) 2021/03/04 01:38:32 fetching corpus: 29397, signal 1045042/1228606 (executing program) 2021/03/04 01:38:32 fetching corpus: 29447, signal 1045649/1228891 (executing program) 2021/03/04 01:38:33 fetching corpus: 29497, signal 1046469/1229242 (executing program) 2021/03/04 01:38:33 fetching corpus: 29547, signal 1046807/1229574 (executing program) 2021/03/04 01:38:33 fetching corpus: 29597, signal 1047271/1229900 (executing program) 2021/03/04 01:38:33 fetching corpus: 29647, signal 1048312/1230255 (executing program) 2021/03/04 01:38:33 fetching corpus: 29697, signal 1048618/1230585 (executing program) 2021/03/04 01:38:33 fetching corpus: 29747, signal 1048875/1230912 (executing program) 2021/03/04 01:38:33 fetching corpus: 29797, signal 1049717/1231228 (executing program) 2021/03/04 01:38:33 fetching corpus: 29847, signal 1050023/1231550 (executing program) 2021/03/04 01:38:33 fetching corpus: 29897, signal 1050437/1231870 (executing program) 2021/03/04 01:38:34 fetching corpus: 29947, signal 1050980/1232197 (executing program) 2021/03/04 01:38:34 fetching corpus: 29997, signal 1051380/1232516 (executing program) 2021/03/04 01:38:34 fetching corpus: 30047, signal 1051861/1232835 (executing program) 2021/03/04 01:38:34 fetching corpus: 30097, signal 1052459/1233148 (executing program) 2021/03/04 01:38:34 fetching corpus: 30147, signal 1053093/1233469 (executing program) 2021/03/04 01:38:34 fetching corpus: 30197, signal 1053383/1233760 (executing program) 2021/03/04 01:38:34 fetching corpus: 30247, signal 1053997/1234073 (executing program) 2021/03/04 01:38:34 fetching corpus: 30297, signal 1054547/1234368 (executing program) 2021/03/04 01:38:35 fetching corpus: 30347, signal 1055195/1234672 (executing program) 2021/03/04 01:38:35 fetching corpus: 30397, signal 1055729/1234965 (executing program) 2021/03/04 01:38:35 fetching corpus: 30447, signal 1056296/1235270 (executing program) 2021/03/04 01:38:35 fetching corpus: 30497, signal 1056894/1235567 (executing program) 2021/03/04 01:38:35 fetching corpus: 30547, signal 1057195/1235868 (executing program) 2021/03/04 01:38:35 fetching corpus: 30597, signal 1057602/1236163 (executing program) 2021/03/04 01:38:35 fetching corpus: 30647, signal 1058233/1236462 (executing program) 2021/03/04 01:38:35 fetching corpus: 30697, signal 1058777/1236756 (executing program) 2021/03/04 01:38:36 fetching corpus: 30747, signal 1059501/1237042 (executing program) 2021/03/04 01:38:36 fetching corpus: 30797, signal 1060031/1237322 (executing program) 2021/03/04 01:38:36 fetching corpus: 30847, signal 1060355/1237594 (executing program) 2021/03/04 01:38:36 fetching corpus: 30897, signal 1060708/1237777 (executing program) 2021/03/04 01:38:36 fetching corpus: 30947, signal 1061123/1237779 (executing program) 2021/03/04 01:38:36 fetching corpus: 30997, signal 1061638/1237779 (executing program) 2021/03/04 01:38:36 fetching corpus: 31047, signal 1062047/1237779 (executing program) 2021/03/04 01:38:36 fetching corpus: 31097, signal 1062539/1237779 (executing program) 2021/03/04 01:38:36 fetching corpus: 31147, signal 1063031/1237779 (executing program) 2021/03/04 01:38:36 fetching corpus: 31197, signal 1063426/1237779 (executing program) 2021/03/04 01:38:37 fetching corpus: 31247, signal 1063867/1237779 (executing program) 2021/03/04 01:38:37 fetching corpus: 31297, signal 1064445/1237779 (executing program) 2021/03/04 01:38:37 fetching corpus: 31347, signal 1064941/1237779 (executing program) 2021/03/04 01:38:37 fetching corpus: 31397, signal 1065376/1237779 (executing program) 2021/03/04 01:38:37 fetching corpus: 31447, signal 1065895/1237780 (executing program) 2021/03/04 01:38:37 fetching corpus: 31497, signal 1066356/1237792 (executing program) 2021/03/04 01:38:37 fetching corpus: 31547, signal 1066582/1237792 (executing program) 2021/03/04 01:38:37 fetching corpus: 31597, signal 1066871/1237792 (executing program) 2021/03/04 01:38:37 fetching corpus: 31647, signal 1067592/1237792 (executing program) 2021/03/04 01:38:38 fetching corpus: 31697, signal 1068081/1237792 (executing program) 2021/03/04 01:38:38 fetching corpus: 31747, signal 1068514/1237793 (executing program) 2021/03/04 01:38:38 fetching corpus: 31797, signal 1068936/1237793 (executing program) 2021/03/04 01:38:38 fetching corpus: 31847, signal 1069522/1237793 (executing program) 2021/03/04 01:38:38 fetching corpus: 31897, signal 1069804/1237794 (executing program) 2021/03/04 01:38:38 fetching corpus: 31947, signal 1070287/1237794 (executing program) 2021/03/04 01:38:38 fetching corpus: 31997, signal 1070639/1237794 (executing program) 2021/03/04 01:38:38 fetching corpus: 32047, signal 1071044/1237794 (executing program) 2021/03/04 01:38:39 fetching corpus: 32097, signal 1071405/1237794 (executing program) 2021/03/04 01:38:39 fetching corpus: 32147, signal 1071970/1237794 (executing program) 2021/03/04 01:38:39 fetching corpus: 32197, signal 1072509/1237794 (executing program) 2021/03/04 01:38:39 fetching corpus: 32247, signal 1072957/1237794 (executing program) 2021/03/04 01:38:39 fetching corpus: 32297, signal 1073471/1237794 (executing program) 2021/03/04 01:38:39 fetching corpus: 32347, signal 1074491/1237795 (executing program) 2021/03/04 01:38:39 fetching corpus: 32397, signal 1075055/1237795 (executing program) 2021/03/04 01:38:40 fetching corpus: 32447, signal 1075536/1237795 (executing program) 2021/03/04 01:38:40 fetching corpus: 32497, signal 1076002/1237795 (executing program) 2021/03/04 01:38:40 fetching corpus: 32547, signal 1076671/1237823 (executing program) 2021/03/04 01:38:40 fetching corpus: 32597, signal 1076947/1237823 (executing program) 2021/03/04 01:38:40 fetching corpus: 32647, signal 1077269/1237823 (executing program) 2021/03/04 01:38:40 fetching corpus: 32697, signal 1077575/1237823 (executing program) 2021/03/04 01:38:40 fetching corpus: 32747, signal 1078081/1237823 (executing program) 2021/03/04 01:38:40 fetching corpus: 32797, signal 1078391/1237824 (executing program) 2021/03/04 01:38:40 fetching corpus: 32847, signal 1079392/1237824 (executing program) 2021/03/04 01:38:40 fetching corpus: 32897, signal 1079985/1237824 (executing program) 2021/03/04 01:38:41 fetching corpus: 32947, signal 1080406/1237824 (executing program) 2021/03/04 01:38:41 fetching corpus: 32997, signal 1081077/1237824 (executing program) 2021/03/04 01:38:41 fetching corpus: 33047, signal 1081335/1237824 (executing program) 2021/03/04 01:38:41 fetching corpus: 33097, signal 1081648/1237824 (executing program) 2021/03/04 01:38:41 fetching corpus: 33147, signal 1082128/1237824 (executing program) 2021/03/04 01:38:41 fetching corpus: 33197, signal 1082694/1237824 (executing program) 2021/03/04 01:38:41 fetching corpus: 33247, signal 1083383/1237824 (executing program) 2021/03/04 01:38:41 fetching corpus: 33297, signal 1083842/1237829 (executing program) 2021/03/04 01:38:42 fetching corpus: 33347, signal 1084113/1237829 (executing program) 2021/03/04 01:38:42 fetching corpus: 33397, signal 1084416/1237829 (executing program) 2021/03/04 01:38:42 fetching corpus: 33447, signal 1084804/1237829 (executing program) 2021/03/04 01:38:42 fetching corpus: 33497, signal 1085203/1237829 (executing program) 2021/03/04 01:38:42 fetching corpus: 33547, signal 1085625/1237830 (executing program) 2021/03/04 01:38:42 fetching corpus: 33597, signal 1085978/1237830 (executing program) 2021/03/04 01:38:42 fetching corpus: 33647, signal 1086332/1237831 (executing program) 2021/03/04 01:38:42 fetching corpus: 33697, signal 1086660/1237831 (executing program) 2021/03/04 01:38:43 fetching corpus: 33747, signal 1087097/1237831 (executing program) 2021/03/04 01:38:43 fetching corpus: 33797, signal 1087443/1237831 (executing program) 2021/03/04 01:38:43 fetching corpus: 33847, signal 1087907/1237831 (executing program) 2021/03/04 01:38:43 fetching corpus: 33897, signal 1088304/1237836 (executing program) 2021/03/04 01:38:43 fetching corpus: 33947, signal 1088620/1237837 (executing program) 2021/03/04 01:38:43 fetching corpus: 33997, signal 1089066/1237837 (executing program) 2021/03/04 01:38:43 fetching corpus: 34047, signal 1090064/1237837 (executing program) 2021/03/04 01:38:44 fetching corpus: 34097, signal 1090473/1237837 (executing program) 2021/03/04 01:38:44 fetching corpus: 34147, signal 1090857/1237837 (executing program) 2021/03/04 01:38:44 fetching corpus: 34197, signal 1091342/1237837 (executing program) 2021/03/04 01:38:44 fetching corpus: 34247, signal 1091699/1237838 (executing program) 2021/03/04 01:38:44 fetching corpus: 34297, signal 1092138/1237838 (executing program) 2021/03/04 01:38:44 fetching corpus: 34347, signal 1092571/1237838 (executing program) 2021/03/04 01:38:44 fetching corpus: 34397, signal 1092858/1237839 (executing program) 2021/03/04 01:38:44 fetching corpus: 34447, signal 1093356/1237839 (executing program) 2021/03/04 01:38:45 fetching corpus: 34497, signal 1093729/1237839 (executing program) 2021/03/04 01:38:45 fetching corpus: 34547, signal 1094105/1237839 (executing program) 2021/03/04 01:38:45 fetching corpus: 34597, signal 1094608/1237840 (executing program) 2021/03/04 01:38:45 fetching corpus: 34647, signal 1095044/1237840 (executing program) 2021/03/04 01:38:45 fetching corpus: 34697, signal 1095353/1237840 (executing program) 2021/03/04 01:38:45 fetching corpus: 34747, signal 1095613/1237840 (executing program) 2021/03/04 01:38:45 fetching corpus: 34797, signal 1096052/1237840 (executing program) 2021/03/04 01:38:45 fetching corpus: 34847, signal 1096502/1237840 (executing program) 2021/03/04 01:38:46 fetching corpus: 34897, signal 1096785/1237840 (executing program) 2021/03/04 01:38:46 fetching corpus: 34947, signal 1097299/1237840 (executing program) 2021/03/04 01:38:46 fetching corpus: 34997, signal 1097608/1237840 (executing program) 2021/03/04 01:38:46 fetching corpus: 35047, signal 1097977/1237840 (executing program) 2021/03/04 01:38:46 fetching corpus: 35097, signal 1098221/1237842 (executing program) 2021/03/04 01:38:46 fetching corpus: 35147, signal 1098559/1237842 (executing program) 2021/03/04 01:38:46 fetching corpus: 35197, signal 1098917/1237842 (executing program) 2021/03/04 01:38:46 fetching corpus: 35247, signal 1099288/1237842 (executing program) 2021/03/04 01:38:47 fetching corpus: 35297, signal 1099587/1237842 (executing program) 2021/03/04 01:38:47 fetching corpus: 35347, signal 1099964/1237842 (executing program) 2021/03/04 01:38:47 fetching corpus: 35397, signal 1100416/1237842 (executing program) 2021/03/04 01:38:47 fetching corpus: 35447, signal 1100695/1237842 (executing program) 2021/03/04 01:38:47 fetching corpus: 35497, signal 1101059/1237842 (executing program) 2021/03/04 01:38:47 fetching corpus: 35547, signal 1101337/1237842 (executing program) 2021/03/04 01:38:47 fetching corpus: 35597, signal 1101745/1237842 (executing program) 2021/03/04 01:38:47 fetching corpus: 35647, signal 1102090/1237842 (executing program) 2021/03/04 01:38:47 fetching corpus: 35697, signal 1102428/1237842 (executing program) 2021/03/04 01:38:47 fetching corpus: 35747, signal 1103029/1237842 (executing program) 2021/03/04 01:38:48 fetching corpus: 35797, signal 1103280/1237842 (executing program) 2021/03/04 01:38:48 fetching corpus: 35847, signal 1103604/1237842 (executing program) 2021/03/04 01:38:48 fetching corpus: 35897, signal 1104058/1237842 (executing program) 2021/03/04 01:38:48 fetching corpus: 35947, signal 1104373/1237842 (executing program) 2021/03/04 01:38:48 fetching corpus: 35997, signal 1105031/1237842 (executing program) 2021/03/04 01:38:48 fetching corpus: 36047, signal 1105639/1237842 (executing program) 2021/03/04 01:38:49 fetching corpus: 36097, signal 1106112/1237842 (executing program) 2021/03/04 01:38:49 fetching corpus: 36147, signal 1106466/1237842 (executing program) 2021/03/04 01:38:49 fetching corpus: 36197, signal 1106819/1237842 (executing program) 2021/03/04 01:38:49 fetching corpus: 36247, signal 1107088/1237842 (executing program) 2021/03/04 01:38:49 fetching corpus: 36297, signal 1107319/1237842 (executing program) 2021/03/04 01:38:49 fetching corpus: 36347, signal 1107674/1237842 (executing program) 2021/03/04 01:38:49 fetching corpus: 36397, signal 1108069/1237842 (executing program) 2021/03/04 01:38:50 fetching corpus: 36447, signal 1108419/1237842 (executing program) 2021/03/04 01:38:50 fetching corpus: 36497, signal 1108786/1237842 (executing program) 2021/03/04 01:38:50 fetching corpus: 36547, signal 1109157/1237842 (executing program) 2021/03/04 01:38:50 fetching corpus: 36597, signal 1109586/1237842 (executing program) 2021/03/04 01:38:50 fetching corpus: 36647, signal 1109915/1237842 (executing program) 2021/03/04 01:38:50 fetching corpus: 36697, signal 1110206/1237842 (executing program) 2021/03/04 01:38:50 fetching corpus: 36747, signal 1110676/1237842 (executing program) 2021/03/04 01:38:50 fetching corpus: 36797, signal 1110952/1237842 (executing program) 2021/03/04 01:38:50 fetching corpus: 36847, signal 1111664/1237842 (executing program) 2021/03/04 01:38:51 fetching corpus: 36897, signal 1112012/1237842 (executing program) 2021/03/04 01:38:51 fetching corpus: 36947, signal 1112341/1237842 (executing program) 2021/03/04 01:38:51 fetching corpus: 36997, signal 1112781/1237842 (executing program) 2021/03/04 01:38:51 fetching corpus: 37047, signal 1113140/1237842 (executing program) 2021/03/04 01:38:51 fetching corpus: 37097, signal 1113487/1237842 (executing program) 2021/03/04 01:38:51 fetching corpus: 37147, signal 1113846/1237842 (executing program) 2021/03/04 01:38:51 fetching corpus: 37197, signal 1114285/1237842 (executing program) 2021/03/04 01:38:51 fetching corpus: 37247, signal 1114815/1237842 (executing program) 2021/03/04 01:38:52 fetching corpus: 37297, signal 1115159/1237842 (executing program) 2021/03/04 01:38:52 fetching corpus: 37347, signal 1115569/1237842 (executing program) 2021/03/04 01:38:52 fetching corpus: 37397, signal 1115871/1237842 (executing program) 2021/03/04 01:38:52 fetching corpus: 37447, signal 1116254/1237842 (executing program) 2021/03/04 01:38:52 fetching corpus: 37497, signal 1116698/1237842 (executing program) 2021/03/04 01:38:52 fetching corpus: 37547, signal 1117058/1237842 (executing program) 2021/03/04 01:38:52 fetching corpus: 37597, signal 1117551/1237842 (executing program) 2021/03/04 01:38:52 fetching corpus: 37647, signal 1117956/1237842 (executing program) 2021/03/04 01:38:53 fetching corpus: 37697, signal 1118501/1237842 (executing program) 2021/03/04 01:38:53 fetching corpus: 37747, signal 1118882/1237843 (executing program) 2021/03/04 01:38:53 fetching corpus: 37797, signal 1119290/1237843 (executing program) 2021/03/04 01:38:53 fetching corpus: 37847, signal 1119590/1237862 (executing program) 2021/03/04 01:38:53 fetching corpus: 37897, signal 1120123/1237862 (executing program) 2021/03/04 01:38:53 fetching corpus: 37947, signal 1120539/1237862 (executing program) 2021/03/04 01:38:53 fetching corpus: 37997, signal 1120777/1237862 (executing program) 2021/03/04 01:38:53 fetching corpus: 38047, signal 1121147/1237862 (executing program) 2021/03/04 01:38:53 fetching corpus: 38097, signal 1121775/1237862 (executing program) 2021/03/04 01:38:54 fetching corpus: 38147, signal 1122224/1237862 (executing program) 2021/03/04 01:38:54 fetching corpus: 38197, signal 1122597/1237862 (executing program) 2021/03/04 01:38:54 fetching corpus: 38247, signal 1123020/1237862 (executing program) 2021/03/04 01:38:54 fetching corpus: 38297, signal 1123299/1237862 (executing program) 2021/03/04 01:38:54 fetching corpus: 38346, signal 1123652/1237862 (executing program) 2021/03/04 01:38:54 fetching corpus: 38396, signal 1124065/1237862 (executing program) 2021/03/04 01:38:55 fetching corpus: 38446, signal 1124456/1237862 (executing program) 2021/03/04 01:38:55 fetching corpus: 38496, signal 1125010/1237862 (executing program) 2021/03/04 01:38:55 fetching corpus: 38546, signal 1125281/1237862 (executing program) 2021/03/04 01:38:55 fetching corpus: 38596, signal 1125560/1237862 (executing program) 2021/03/04 01:38:55 fetching corpus: 38646, signal 1125913/1237870 (executing program) 2021/03/04 01:38:55 fetching corpus: 38696, signal 1126207/1237870 (executing program) 2021/03/04 01:38:55 fetching corpus: 38746, signal 1126610/1237870 (executing program) 2021/03/04 01:38:55 fetching corpus: 38796, signal 1126811/1237870 (executing program) 2021/03/04 01:38:56 fetching corpus: 38846, signal 1127303/1237870 (executing program) 2021/03/04 01:38:56 fetching corpus: 38896, signal 1127639/1237870 (executing program) 2021/03/04 01:38:56 fetching corpus: 38946, signal 1128020/1237870 (executing program) 2021/03/04 01:38:56 fetching corpus: 38996, signal 1128331/1237870 (executing program) 2021/03/04 01:38:56 fetching corpus: 39046, signal 1128489/1237873 (executing program) 2021/03/04 01:38:56 fetching corpus: 39096, signal 1129189/1237885 (executing program) 2021/03/04 01:38:56 fetching corpus: 39146, signal 1129526/1237885 (executing program) 2021/03/04 01:38:57 fetching corpus: 39196, signal 1129788/1237885 (executing program) 2021/03/04 01:38:57 fetching corpus: 39246, signal 1130056/1237885 (executing program) 2021/03/04 01:38:57 fetching corpus: 39296, signal 1130276/1237885 (executing program) 2021/03/04 01:38:57 fetching corpus: 39346, signal 1130645/1237887 (executing program) 2021/03/04 01:38:57 fetching corpus: 39396, signal 1131077/1237887 (executing program) 2021/03/04 01:38:57 fetching corpus: 39446, signal 1131587/1237888 (executing program) 2021/03/04 01:38:57 fetching corpus: 39496, signal 1131897/1237888 (executing program) 2021/03/04 01:38:57 fetching corpus: 39546, signal 1132281/1237888 (executing program) 2021/03/04 01:38:57 fetching corpus: 39596, signal 1132529/1237888 (executing program) 2021/03/04 01:38:57 fetching corpus: 39646, signal 1132839/1237889 (executing program) 2021/03/04 01:38:58 fetching corpus: 39696, signal 1133290/1237889 (executing program) 2021/03/04 01:38:58 fetching corpus: 39746, signal 1133838/1237889 (executing program) 2021/03/04 01:38:58 fetching corpus: 39796, signal 1134129/1237889 (executing program) 2021/03/04 01:38:58 fetching corpus: 39846, signal 1134506/1237889 (executing program) 2021/03/04 01:38:58 fetching corpus: 39896, signal 1134783/1237889 (executing program) 2021/03/04 01:38:58 fetching corpus: 39946, signal 1135110/1237889 (executing program) 2021/03/04 01:38:58 fetching corpus: 39996, signal 1136148/1237889 (executing program) 2021/03/04 01:38:59 fetching corpus: 40046, signal 1136498/1237889 (executing program) 2021/03/04 01:38:59 fetching corpus: 40096, signal 1136952/1237889 (executing program) 2021/03/04 01:38:59 fetching corpus: 40146, signal 1137251/1237889 (executing program) 2021/03/04 01:38:59 fetching corpus: 40196, signal 1137695/1237889 (executing program) 2021/03/04 01:38:59 fetching corpus: 40246, signal 1137946/1237889 (executing program) 2021/03/04 01:38:59 fetching corpus: 40296, signal 1138271/1237889 (executing program) 2021/03/04 01:39:00 fetching corpus: 40346, signal 1138945/1237889 (executing program) 2021/03/04 01:39:00 fetching corpus: 40396, signal 1139219/1237889 (executing program) 2021/03/04 01:39:00 fetching corpus: 40446, signal 1139520/1237889 (executing program) 2021/03/04 01:39:00 fetching corpus: 40496, signal 1139845/1237890 (executing program) 2021/03/04 01:39:00 fetching corpus: 40546, signal 1140177/1237890 (executing program) 2021/03/04 01:39:00 fetching corpus: 40596, signal 1140510/1237890 (executing program) 2021/03/04 01:39:00 fetching corpus: 40646, signal 1140917/1237890 (executing program) 2021/03/04 01:39:00 fetching corpus: 40696, signal 1141170/1237890 (executing program) 2021/03/04 01:39:01 fetching corpus: 40746, signal 1141467/1237890 (executing program) 2021/03/04 01:39:01 fetching corpus: 40796, signal 1141809/1237890 (executing program) 2021/03/04 01:39:01 fetching corpus: 40846, signal 1142161/1237890 (executing program) 2021/03/04 01:39:01 fetching corpus: 40896, signal 1142393/1237890 (executing program) 2021/03/04 01:39:01 fetching corpus: 40946, signal 1142648/1237890 (executing program) 2021/03/04 01:39:01 fetching corpus: 40996, signal 1143130/1237890 (executing program) 2021/03/04 01:39:01 fetching corpus: 41046, signal 1143518/1237890 (executing program) 2021/03/04 01:39:02 fetching corpus: 41096, signal 1143787/1237890 (executing program) 2021/03/04 01:39:02 fetching corpus: 41146, signal 1144251/1237890 (executing program) 2021/03/04 01:39:02 fetching corpus: 41196, signal 1144514/1237890 (executing program) 2021/03/04 01:39:02 fetching corpus: 41246, signal 1145165/1237890 (executing program) 2021/03/04 01:39:02 fetching corpus: 41296, signal 1145535/1237890 (executing program) 2021/03/04 01:39:02 fetching corpus: 41346, signal 1148035/1237890 (executing program) 2021/03/04 01:39:02 fetching corpus: 41396, signal 1148312/1237890 (executing program) 2021/03/04 01:39:02 fetching corpus: 41446, signal 1148895/1237895 (executing program) 2021/03/04 01:39:02 fetching corpus: 41496, signal 1149188/1237895 (executing program) 2021/03/04 01:39:03 fetching corpus: 41546, signal 1149456/1237895 (executing program) 2021/03/04 01:39:03 fetching corpus: 41596, signal 1149723/1237895 (executing program) 2021/03/04 01:39:03 fetching corpus: 41646, signal 1150002/1237895 (executing program) 2021/03/04 01:39:03 fetching corpus: 41696, signal 1150299/1237895 (executing program) 2021/03/04 01:39:03 fetching corpus: 41746, signal 1150744/1237895 (executing program) 2021/03/04 01:39:03 fetching corpus: 41796, signal 1151055/1237895 (executing program) 2021/03/04 01:39:03 fetching corpus: 41846, signal 1151474/1237895 (executing program) 2021/03/04 01:39:03 fetching corpus: 41896, signal 1151762/1237895 (executing program) 2021/03/04 01:39:03 fetching corpus: 41946, signal 1152440/1237895 (executing program) 2021/03/04 01:39:04 fetching corpus: 41996, signal 1152646/1237895 (executing program) 2021/03/04 01:39:04 fetching corpus: 42046, signal 1152950/1237895 (executing program) 2021/03/04 01:39:04 fetching corpus: 42096, signal 1153177/1237895 (executing program) 2021/03/04 01:39:04 fetching corpus: 42146, signal 1153503/1237895 (executing program) 2021/03/04 01:39:04 fetching corpus: 42196, signal 1154016/1237895 (executing program) 2021/03/04 01:39:04 fetching corpus: 42246, signal 1154256/1237895 (executing program) 2021/03/04 01:39:04 fetching corpus: 42296, signal 1154550/1237895 (executing program) 2021/03/04 01:39:04 fetching corpus: 42346, signal 1155071/1237895 (executing program) 2021/03/04 01:39:04 fetching corpus: 42396, signal 1155330/1237895 (executing program) 2021/03/04 01:39:05 fetching corpus: 42446, signal 1155653/1237895 (executing program) 2021/03/04 01:39:05 fetching corpus: 42496, signal 1155860/1237895 (executing program) 2021/03/04 01:39:05 fetching corpus: 42546, signal 1156440/1237896 (executing program) 2021/03/04 01:39:05 fetching corpus: 42596, signal 1156743/1237896 (executing program) 2021/03/04 01:39:05 fetching corpus: 42646, signal 1156985/1237896 (executing program) 2021/03/04 01:39:05 fetching corpus: 42696, signal 1157331/1237896 (executing program) 2021/03/04 01:39:05 fetching corpus: 42746, signal 1157608/1237896 (executing program) 2021/03/04 01:39:06 fetching corpus: 42796, signal 1157867/1237896 (executing program) 2021/03/04 01:39:06 fetching corpus: 42846, signal 1158070/1237896 (executing program) 2021/03/04 01:39:06 fetching corpus: 42896, signal 1158315/1237896 (executing program) 2021/03/04 01:39:06 fetching corpus: 42946, signal 1158621/1237896 (executing program) 2021/03/04 01:39:06 fetching corpus: 42996, signal 1158881/1237896 (executing program) [ 194.035931][ T3254] ieee802154 phy0 wpan0: encryption failed: -22 [ 194.042256][ T3254] ieee802154 phy1 wpan1: encryption failed: -22 2021/03/04 01:39:06 fetching corpus: 43046, signal 1159171/1237896 (executing program) 2021/03/04 01:39:07 fetching corpus: 43096, signal 1159536/1237896 (executing program) 2021/03/04 01:39:07 fetching corpus: 43146, signal 1159834/1237896 (executing program) 2021/03/04 01:39:07 fetching corpus: 43196, signal 1160120/1237896 (executing program) 2021/03/04 01:39:07 fetching corpus: 43246, signal 1160366/1237896 (executing program) 2021/03/04 01:39:07 fetching corpus: 43296, signal 1160580/1237896 (executing program) 2021/03/04 01:39:07 fetching corpus: 43346, signal 1160926/1237896 (executing program) 2021/03/04 01:39:07 fetching corpus: 43396, signal 1161161/1237896 (executing program) 2021/03/04 01:39:07 fetching corpus: 43446, signal 1161478/1237896 (executing program) 2021/03/04 01:39:07 fetching corpus: 43496, signal 1161719/1237896 (executing program) 2021/03/04 01:39:08 fetching corpus: 43546, signal 1162014/1237896 (executing program) 2021/03/04 01:39:08 fetching corpus: 43596, signal 1162290/1237896 (executing program) 2021/03/04 01:39:08 fetching corpus: 43646, signal 1162767/1237896 (executing program) 2021/03/04 01:39:08 fetching corpus: 43696, signal 1163038/1237896 (executing program) 2021/03/04 01:39:08 fetching corpus: 43746, signal 1163257/1237900 (executing program) 2021/03/04 01:39:08 fetching corpus: 43796, signal 1163462/1237900 (executing program) 2021/03/04 01:39:08 fetching corpus: 43846, signal 1163890/1237900 (executing program) 2021/03/04 01:39:08 fetching corpus: 43896, signal 1164399/1237900 (executing program) 2021/03/04 01:39:08 fetching corpus: 43946, signal 1164818/1237900 (executing program) 2021/03/04 01:39:09 fetching corpus: 43996, signal 1165252/1237900 (executing program) 2021/03/04 01:39:09 fetching corpus: 44046, signal 1165497/1237900 (executing program) 2021/03/04 01:39:09 fetching corpus: 44096, signal 1165803/1237900 (executing program) 2021/03/04 01:39:09 fetching corpus: 44146, signal 1166027/1237900 (executing program) 2021/03/04 01:39:09 fetching corpus: 44196, signal 1166326/1237900 (executing program) 2021/03/04 01:39:09 fetching corpus: 44246, signal 1166604/1237900 (executing program) 2021/03/04 01:39:09 fetching corpus: 44296, signal 1166884/1237900 (executing program) 2021/03/04 01:39:09 fetching corpus: 44346, signal 1167207/1237900 (executing program) 2021/03/04 01:39:10 fetching corpus: 44396, signal 1167551/1237900 (executing program) 2021/03/04 01:39:10 fetching corpus: 44446, signal 1167830/1237906 (executing program) 2021/03/04 01:39:10 fetching corpus: 44496, signal 1168050/1237906 (executing program) 2021/03/04 01:39:10 fetching corpus: 44546, signal 1168307/1237906 (executing program) 2021/03/04 01:39:10 fetching corpus: 44596, signal 1168546/1237906 (executing program) 2021/03/04 01:39:10 fetching corpus: 44646, signal 1168926/1237906 (executing program) 2021/03/04 01:39:10 fetching corpus: 44696, signal 1169274/1237906 (executing program) 2021/03/04 01:39:10 fetching corpus: 44746, signal 1169538/1237906 (executing program) 2021/03/04 01:39:11 fetching corpus: 44796, signal 1169895/1237906 (executing program) 2021/03/04 01:39:11 fetching corpus: 44846, signal 1170261/1237906 (executing program) 2021/03/04 01:39:11 fetching corpus: 44896, signal 1170617/1237906 (executing program) 2021/03/04 01:39:11 fetching corpus: 44946, signal 1170816/1237906 (executing program) 2021/03/04 01:39:11 fetching corpus: 44996, signal 1171278/1237916 (executing program) 2021/03/04 01:39:11 fetching corpus: 45046, signal 1171674/1237916 (executing program) 2021/03/04 01:39:11 fetching corpus: 45096, signal 1171931/1237916 (executing program) 2021/03/04 01:39:12 fetching corpus: 45146, signal 1172264/1237916 (executing program) 2021/03/04 01:39:12 fetching corpus: 45196, signal 1172624/1237916 (executing program) 2021/03/04 01:39:12 fetching corpus: 45246, signal 1172982/1237916 (executing program) 2021/03/04 01:39:12 fetching corpus: 45296, signal 1173245/1237916 (executing program) 2021/03/04 01:39:12 fetching corpus: 45346, signal 1173577/1237916 (executing program) 2021/03/04 01:39:12 fetching corpus: 45396, signal 1173753/1237916 (executing program) 2021/03/04 01:39:12 fetching corpus: 45446, signal 1174403/1237916 (executing program) 2021/03/04 01:39:13 fetching corpus: 45496, signal 1174696/1237916 (executing program) 2021/03/04 01:39:13 fetching corpus: 45546, signal 1174972/1237916 (executing program) 2021/03/04 01:39:13 fetching corpus: 45596, signal 1175294/1237916 (executing program) 2021/03/04 01:39:13 fetching corpus: 45646, signal 1175568/1237916 (executing program) 2021/03/04 01:39:13 fetching corpus: 45696, signal 1175931/1237916 (executing program) 2021/03/04 01:39:13 fetching corpus: 45746, signal 1176179/1237916 (executing program) 2021/03/04 01:39:13 fetching corpus: 45796, signal 1176461/1237916 (executing program) 2021/03/04 01:39:13 fetching corpus: 45846, signal 1176864/1237916 (executing program) 2021/03/04 01:39:14 fetching corpus: 45896, signal 1177130/1237916 (executing program) 2021/03/04 01:39:14 fetching corpus: 45946, signal 1177441/1237916 (executing program) 2021/03/04 01:39:14 fetching corpus: 45996, signal 1177720/1237916 (executing program) 2021/03/04 01:39:14 fetching corpus: 46046, signal 1178208/1237917 (executing program) 2021/03/04 01:39:14 fetching corpus: 46096, signal 1178605/1237917 (executing program) 2021/03/04 01:39:14 fetching corpus: 46146, signal 1179041/1237917 (executing program) 2021/03/04 01:39:14 fetching corpus: 46196, signal 1179285/1237917 (executing program) 2021/03/04 01:39:14 fetching corpus: 46246, signal 1179616/1237917 (executing program) 2021/03/04 01:39:15 fetching corpus: 46296, signal 1179918/1237917 (executing program) 2021/03/04 01:39:15 fetching corpus: 46346, signal 1180124/1237917 (executing program) 2021/03/04 01:39:15 fetching corpus: 46396, signal 1180376/1237917 (executing program) 2021/03/04 01:39:15 fetching corpus: 46446, signal 1180541/1237917 (executing program) 2021/03/04 01:39:15 fetching corpus: 46496, signal 1180944/1237917 (executing program) 2021/03/04 01:39:15 fetching corpus: 46546, signal 1181466/1237917 (executing program) 2021/03/04 01:39:15 fetching corpus: 46596, signal 1181794/1237917 (executing program) 2021/03/04 01:39:15 fetching corpus: 46646, signal 1182006/1237917 (executing program) 2021/03/04 01:39:15 fetching corpus: 46696, signal 1182232/1237917 (executing program) 2021/03/04 01:39:16 fetching corpus: 46746, signal 1182574/1237917 (executing program) 2021/03/04 01:39:16 fetching corpus: 46796, signal 1182914/1237917 (executing program) 2021/03/04 01:39:16 fetching corpus: 46846, signal 1183194/1237917 (executing program) 2021/03/04 01:39:16 fetching corpus: 46896, signal 1183452/1237917 (executing program) 2021/03/04 01:39:16 fetching corpus: 46946, signal 1183781/1237917 (executing program) 2021/03/04 01:39:16 fetching corpus: 46996, signal 1184013/1237917 (executing program) 2021/03/04 01:39:16 fetching corpus: 47046, signal 1184398/1237917 (executing program) 2021/03/04 01:39:16 fetching corpus: 47096, signal 1184627/1237917 (executing program) 2021/03/04 01:39:17 fetching corpus: 47146, signal 1184769/1237917 (executing program) 2021/03/04 01:39:17 fetching corpus: 47196, signal 1184992/1237917 (executing program) 2021/03/04 01:39:17 fetching corpus: 47246, signal 1185332/1237917 (executing program) 2021/03/04 01:39:17 fetching corpus: 47296, signal 1185665/1237917 (executing program) 2021/03/04 01:39:17 fetching corpus: 47346, signal 1185957/1237917 (executing program) 2021/03/04 01:39:18 fetching corpus: 47396, signal 1186216/1237923 (executing program) 2021/03/04 01:39:18 fetching corpus: 47446, signal 1186722/1237923 (executing program) 2021/03/04 01:39:18 fetching corpus: 47496, signal 1186989/1237925 (executing program) 2021/03/04 01:39:18 fetching corpus: 47546, signal 1187271/1237925 (executing program) 2021/03/04 01:39:18 fetching corpus: 47596, signal 1187863/1237925 (executing program) 2021/03/04 01:39:19 fetching corpus: 47646, signal 1188019/1237925 (executing program) 2021/03/04 01:39:19 fetching corpus: 47696, signal 1188425/1237925 (executing program) 2021/03/04 01:39:19 fetching corpus: 47746, signal 1188659/1237925 (executing program) 2021/03/04 01:39:19 fetching corpus: 47796, signal 1188900/1237925 (executing program) 2021/03/04 01:39:19 fetching corpus: 47846, signal 1189234/1237925 (executing program) 2021/03/04 01:39:19 fetching corpus: 47896, signal 1189416/1237925 (executing program) 2021/03/04 01:39:19 fetching corpus: 47946, signal 1189689/1237925 (executing program) 2021/03/04 01:39:19 fetching corpus: 47996, signal 1190034/1237925 (executing program) 2021/03/04 01:39:20 fetching corpus: 48046, signal 1190520/1237925 (executing program) 2021/03/04 01:39:20 fetching corpus: 48096, signal 1190933/1237925 (executing program) 2021/03/04 01:39:20 fetching corpus: 48146, signal 1191208/1237925 (executing program) 2021/03/04 01:39:20 fetching corpus: 48196, signal 1191496/1237925 (executing program) 2021/03/04 01:39:20 fetching corpus: 48246, signal 1191867/1237925 (executing program) 2021/03/04 01:39:20 fetching corpus: 48296, signal 1192171/1237925 (executing program) 2021/03/04 01:39:20 fetching corpus: 48346, signal 1192465/1237925 (executing program) 2021/03/04 01:39:20 fetching corpus: 48396, signal 1192741/1237925 (executing program) 2021/03/04 01:39:20 fetching corpus: 48446, signal 1192955/1237939 (executing program) 2021/03/04 01:39:21 fetching corpus: 48496, signal 1193228/1237939 (executing program) 2021/03/04 01:39:21 fetching corpus: 48546, signal 1193643/1237939 (executing program) 2021/03/04 01:39:21 fetching corpus: 48596, signal 1194067/1237939 (executing program) 2021/03/04 01:39:21 fetching corpus: 48646, signal 1194357/1237939 (executing program) 2021/03/04 01:39:21 fetching corpus: 48696, signal 1194850/1237939 (executing program) 2021/03/04 01:39:21 fetching corpus: 48746, signal 1195107/1237939 (executing program) 2021/03/04 01:39:21 fetching corpus: 48796, signal 1195375/1237939 (executing program) 2021/03/04 01:39:21 fetching corpus: 48846, signal 1195613/1237939 (executing program) 2021/03/04 01:39:22 fetching corpus: 48896, signal 1195772/1237939 (executing program) 2021/03/04 01:39:22 fetching corpus: 48946, signal 1195996/1237939 (executing program) 2021/03/04 01:39:22 fetching corpus: 48996, signal 1196229/1237939 (executing program) 2021/03/04 01:39:22 fetching corpus: 49046, signal 1196616/1237939 (executing program) 2021/03/04 01:39:22 fetching corpus: 49096, signal 1196949/1237939 (executing program) 2021/03/04 01:39:22 fetching corpus: 49146, signal 1197115/1237939 (executing program) 2021/03/04 01:39:23 fetching corpus: 49196, signal 1197373/1237939 (executing program) 2021/03/04 01:39:23 fetching corpus: 49246, signal 1197664/1237939 (executing program) 2021/03/04 01:39:23 fetching corpus: 49296, signal 1197971/1237939 (executing program) 2021/03/04 01:39:23 fetching corpus: 49346, signal 1198445/1237939 (executing program) 2021/03/04 01:39:23 fetching corpus: 49396, signal 1198694/1237939 (executing program) 2021/03/04 01:39:23 fetching corpus: 49446, signal 1199004/1237939 (executing program) 2021/03/04 01:39:23 fetching corpus: 49496, signal 1199862/1237940 (executing program) 2021/03/04 01:39:23 fetching corpus: 49546, signal 1200371/1237940 (executing program) 2021/03/04 01:39:23 fetching corpus: 49583, signal 1200536/1237940 (executing program) 2021/03/04 01:39:23 fetching corpus: 49583, signal 1200536/1237940 (executing program) 2021/03/04 01:39:25 starting 6 fuzzer processes 01:39:25 executing program 0: syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x80000) [ 213.193939][ T36] audit: type=1400 audit(1614821965.945:8): avc: denied { execmem } for pid=8392 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 01:39:26 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000011c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, 0x0) 01:39:26 executing program 2: syz_open_dev$evdev(&(0x7f0000000440)='/dev/input/event#\x00', 0x4, 0x0) syz_open_dev$evdev(&(0x7f0000000740)='/dev/input/event#\x00', 0x0, 0x0) 01:39:26 executing program 3: syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x9, 0x20002) 01:39:26 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x107200) [ 214.513078][ T8393] IPVS: ftp: loaded support on port[0] = 21 01:39:27 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000004c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, 0x0) [ 214.671758][ T8395] IPVS: ftp: loaded support on port[0] = 21 [ 215.005901][ T8393] chnl_net:caif_netlink_parms(): no params data found [ 215.024939][ T8397] IPVS: ftp: loaded support on port[0] = 21 [ 215.360588][ T8393] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.369359][ T8393] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.380999][ T8393] device bridge_slave_0 entered promiscuous mode [ 215.391850][ T8393] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.396402][ T8399] IPVS: ftp: loaded support on port[0] = 21 [ 215.402351][ T8393] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.413460][ T8393] device bridge_slave_1 entered promiscuous mode [ 215.483728][ T8395] chnl_net:caif_netlink_parms(): no params data found [ 215.538636][ T8401] IPVS: ftp: loaded support on port[0] = 21 [ 215.619105][ T8393] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 215.684989][ T8393] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 215.757522][ T8397] chnl_net:caif_netlink_parms(): no params data found [ 215.769768][ T8393] team0: Port device team_slave_0 added [ 215.795679][ T8393] team0: Port device team_slave_1 added [ 215.819411][ T8395] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.827505][ T8395] bridge0: port 1(bridge_slave_0) entered disabled state [ 215.836030][ T8395] device bridge_slave_0 entered promiscuous mode [ 215.848842][ T8395] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.857188][ T8395] bridge0: port 2(bridge_slave_1) entered disabled state [ 215.866206][ T8395] device bridge_slave_1 entered promiscuous mode [ 215.897654][ T8393] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 215.907646][ T8393] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 215.934970][ T8393] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 215.976469][ T8393] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 215.984502][ T8393] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 216.012585][ T8393] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 216.044664][ T8395] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 216.077631][ T8395] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 216.090150][ T8393] device hsr_slave_0 entered promiscuous mode [ 216.097880][ T8393] device hsr_slave_1 entered promiscuous mode [ 216.332565][ T8397] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.339668][ T8397] bridge0: port 1(bridge_slave_0) entered disabled state [ 216.357934][ T8397] device bridge_slave_0 entered promiscuous mode [ 216.381237][ T8395] team0: Port device team_slave_0 added [ 216.388917][ T8397] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.397264][ T8397] bridge0: port 2(bridge_slave_1) entered disabled state [ 216.406927][ T8397] device bridge_slave_1 entered promiscuous mode [ 216.432662][ T8401] chnl_net:caif_netlink_parms(): no params data found [ 216.441813][ T8399] chnl_net:caif_netlink_parms(): no params data found [ 216.450008][ T3183] Bluetooth: hci0: command 0x0409 tx timeout [ 216.461616][ T8547] IPVS: ftp: loaded support on port[0] = 21 [ 216.477456][ T8395] team0: Port device team_slave_1 added [ 216.566388][ T8397] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 216.580445][ T8397] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 216.604361][ T8395] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 216.611339][ T8395] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 216.637802][ T8395] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 216.657527][ T8395] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 216.665765][ T8395] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 216.672313][ T35] Bluetooth: hci1: command 0x0409 tx timeout [ 216.693753][ T8395] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 216.765507][ T8397] team0: Port device team_slave_0 added [ 216.786280][ T8397] team0: Port device team_slave_1 added [ 216.829696][ T8397] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 216.838088][ T8397] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 216.864992][ T8397] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 216.905869][ T8397] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 216.913246][ T3183] Bluetooth: hci2: command 0x0409 tx timeout [ 216.915439][ T8397] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 216.945581][ T8397] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 216.964460][ T8395] device hsr_slave_0 entered promiscuous mode [ 216.971575][ T8395] device hsr_slave_1 entered promiscuous mode [ 216.978381][ T8395] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 216.987411][ T8395] Cannot create hsr debugfs directory [ 217.047945][ T8399] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.057751][ T8399] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.067488][ T8399] device bridge_slave_0 entered promiscuous mode [ 217.080606][ T8399] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.090465][ T8399] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.099537][ T8399] device bridge_slave_1 entered promiscuous mode [ 217.132885][ T8397] device hsr_slave_0 entered promiscuous mode [ 217.140671][ T8397] device hsr_slave_1 entered promiscuous mode [ 217.147988][ T8397] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 217.156396][ T8397] Cannot create hsr debugfs directory [ 217.167955][ T8401] bridge0: port 1(bridge_slave_0) entered blocking state [ 217.175519][ T8401] bridge0: port 1(bridge_slave_0) entered disabled state [ 217.184897][ T8401] device bridge_slave_0 entered promiscuous mode [ 217.198094][ T8401] bridge0: port 2(bridge_slave_1) entered blocking state [ 217.205540][ T8401] bridge0: port 2(bridge_slave_1) entered disabled state [ 217.215294][ T8401] device bridge_slave_1 entered promiscuous mode [ 217.232520][ T3183] Bluetooth: hci3: command 0x0409 tx timeout [ 217.322165][ T8393] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 217.340710][ T8399] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 217.353026][ T8401] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 217.377038][ T8393] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 217.393743][ T8399] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 217.404324][ T8401] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 217.442768][ T8393] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 217.472432][ T5] Bluetooth: hci4: command 0x0409 tx timeout [ 217.510852][ T8393] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 217.563004][ T8399] team0: Port device team_slave_0 added [ 217.571851][ T8401] team0: Port device team_slave_0 added [ 217.585616][ T8401] team0: Port device team_slave_1 added [ 217.610909][ T8399] team0: Port device team_slave_1 added [ 217.648552][ T8547] chnl_net:caif_netlink_parms(): no params data found [ 217.721393][ T8401] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 217.728444][ T8401] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 217.755488][ T8401] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 217.778034][ T8399] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 217.785863][ T8399] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 217.811922][ T8399] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 217.824739][ T8399] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 217.831686][ T8399] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 217.858563][ T8399] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 217.871207][ T8401] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 217.878473][ T8401] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 217.904895][ T8401] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 217.986373][ T8399] device hsr_slave_0 entered promiscuous mode [ 217.993344][ T8399] device hsr_slave_1 entered promiscuous mode [ 217.999954][ T8399] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 218.008361][ T8399] Cannot create hsr debugfs directory [ 218.029866][ T8401] device hsr_slave_0 entered promiscuous mode [ 218.038669][ T8401] device hsr_slave_1 entered promiscuous mode [ 218.045856][ T8401] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 218.053591][ T8401] Cannot create hsr debugfs directory [ 218.124542][ T8547] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.141451][ T8547] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.149821][ T8547] device bridge_slave_0 entered promiscuous mode [ 218.185949][ T8547] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.193900][ T9250] Bluetooth: hci5: command 0x0409 tx timeout [ 218.199978][ T8547] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.208572][ T8547] device bridge_slave_1 entered promiscuous mode [ 218.215941][ T8395] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 218.286003][ T8395] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 218.296769][ T8395] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 218.336511][ T8547] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 218.352815][ T8547] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 218.364409][ T8395] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 218.472766][ T8547] team0: Port device team_slave_0 added [ 218.483876][ T8547] team0: Port device team_slave_1 added [ 218.495164][ T8397] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 218.513069][ T8397] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 218.523007][ T3775] Bluetooth: hci0: command 0x041b tx timeout [ 218.532347][ T8393] 8021q: adding VLAN 0 to HW filter on device bond0 [ 218.567776][ T8397] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 218.607713][ T8397] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 218.634872][ T9553] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 218.644204][ T9553] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 218.660594][ T8547] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 218.668057][ T8547] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 218.695762][ T8547] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 218.719319][ T8547] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 218.727697][ T8547] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 218.754477][ T8547] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 218.763203][ T9545] Bluetooth: hci1: command 0x041b tx timeout [ 218.773778][ T8393] 8021q: adding VLAN 0 to HW filter on device team0 [ 218.821633][ T8547] device hsr_slave_0 entered promiscuous mode [ 218.830457][ T8547] device hsr_slave_1 entered promiscuous mode [ 218.840477][ T8547] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 218.849606][ T8547] Cannot create hsr debugfs directory [ 218.855299][ T9545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.864601][ T9545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.874383][ T9545] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.881693][ T9545] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.911694][ T9250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 218.934337][ T9250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 218.948181][ T9250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.958570][ T9250] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.965682][ T9250] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.982520][ T8401] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 218.992983][ T3183] Bluetooth: hci2: command 0x041b tx timeout [ 218.993464][ T8401] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 219.043184][ T8401] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 219.060056][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 219.069509][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 219.136855][ T8401] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 219.156196][ T8395] 8021q: adding VLAN 0 to HW filter on device bond0 [ 219.163407][ T9633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 219.173885][ T9633] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 219.186951][ T9633] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 219.206303][ T8399] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 219.226609][ T8399] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 219.237822][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 219.256226][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.287519][ T8399] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 219.297620][ T8399] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 219.311062][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.328966][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.338368][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 219.347260][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.358687][ T8393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 219.366855][ T7] Bluetooth: hci3: command 0x041b tx timeout [ 219.426821][ T9553] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.435112][ T9553] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.469543][ T8395] 8021q: adding VLAN 0 to HW filter on device team0 [ 219.485291][ T9633] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 219.496998][ T9633] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 219.520359][ T8393] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 219.552605][ T9553] Bluetooth: hci4: command 0x041b tx timeout [ 219.572455][ T9553] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.581016][ T9553] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.600517][ T9553] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.607624][ T9553] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.618886][ T9553] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 219.639753][ T8397] 8021q: adding VLAN 0 to HW filter on device bond0 [ 219.668672][ T2957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.679000][ T2957] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.688661][ T2957] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.695772][ T2957] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.704032][ T2957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 219.738355][ T8397] 8021q: adding VLAN 0 to HW filter on device team0 [ 219.752230][ T9553] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 219.766034][ T9553] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 219.776186][ T9553] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 219.788547][ T9553] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 219.798820][ T9553] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 219.846533][ T2957] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 219.855031][ T2957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 219.867010][ T2957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 219.877983][ T2957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 219.887322][ T2957] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.898278][ T8547] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 219.922109][ T9553] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.930644][ T9553] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.941284][ T9553] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.948426][ T9553] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.956714][ T9553] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.965953][ T9553] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.975629][ T9553] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.982776][ T9553] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.990422][ T9553] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.999282][ T9553] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 220.033693][ T8399] 8021q: adding VLAN 0 to HW filter on device bond0 [ 220.041013][ T8547] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 220.059555][ T9553] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 220.069066][ T9553] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 220.078224][ T9553] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 220.086962][ T9553] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 220.109900][ T8393] device veth0_vlan entered promiscuous mode [ 220.123695][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 220.131484][ T8547] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 220.144971][ T8401] 8021q: adding VLAN 0 to HW filter on device bond0 [ 220.162814][ T9698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 220.171598][ T9698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 220.180129][ T9698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 220.188460][ T9698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 220.203168][ T8547] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 220.223988][ T8399] 8021q: adding VLAN 0 to HW filter on device team0 [ 220.236421][ T8393] device veth1_vlan entered promiscuous mode [ 220.243651][ T9698] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 220.251376][ T9698] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 220.259714][ T9698] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 220.268375][ T9698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 220.280138][ T9698] Bluetooth: hci5: command 0x041b tx timeout [ 220.308977][ T9545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 220.318858][ T9545] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 220.329016][ T9545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 220.338704][ T9545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 220.347024][ T9545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 220.356697][ T9545] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 220.365807][ T9545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.375245][ T9545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.384294][ T9545] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.391340][ T9545] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.399679][ T9545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 220.408692][ T9545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.417516][ T9545] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.424647][ T9545] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.432518][ T9545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 220.441175][ T9545] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 220.449435][ T9545] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 220.485145][ T8395] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 220.497751][ T8401] 8021q: adding VLAN 0 to HW filter on device team0 [ 220.505853][ T9553] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 220.516580][ T9553] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 220.525594][ T9553] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 220.574282][ T9698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 220.583925][ T9698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 220.598699][ T9698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 220.607106][ T9698] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 220.616079][ T9698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 220.625875][ T9698] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 220.635021][ T9698] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 220.644352][ T9698] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 220.654291][ T8397] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 220.664075][ T9698] Bluetooth: hci0: command 0x040f tx timeout [ 220.670743][ T8399] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 220.684912][ T8399] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 220.732895][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 220.740636][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 220.749748][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 220.760427][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 220.769404][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 220.778419][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 220.787061][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 220.796504][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.805534][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.814769][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.821838][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 220.830306][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 220.839338][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 220.847828][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.854945][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 220.863377][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 220.872332][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 220.881622][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 220.889435][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 220.915833][ T2957] Bluetooth: hci1: command 0x040f tx timeout [ 220.923974][ T2957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 220.938150][ T8393] device veth0_macvtap entered promiscuous mode [ 220.978745][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 220.987798][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 220.998432][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 221.008960][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 221.018435][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 221.026973][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 221.035294][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 221.044758][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 221.053851][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 221.061253][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 221.069691][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 221.072157][ T2957] Bluetooth: hci2: command 0x040f tx timeout [ 221.083869][ T8399] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 221.103224][ T8397] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 221.124005][ T8393] device veth1_macvtap entered promiscuous mode [ 221.133720][ T9647] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 221.144208][ T9647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 221.153520][ T9647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 221.161631][ T9647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 221.170789][ T9647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 221.185818][ T8401] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 221.197398][ T8401] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 221.213537][ T8395] device veth0_vlan entered promiscuous mode [ 221.237807][ T9647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 221.252917][ T9647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 221.261535][ T9647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 221.279787][ T9647] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 221.322952][ T8547] 8021q: adding VLAN 0 to HW filter on device bond0 [ 221.384174][ T8393] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 221.392436][ T9553] Bluetooth: hci3: command 0x040f tx timeout [ 221.393769][ T9633] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 221.413437][ T9633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 221.427354][ T8393] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 221.449091][ T9633] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 221.459430][ T9633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 221.468743][ T9633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 221.478959][ T9633] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 221.488120][ T9633] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 221.496140][ T9633] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 221.514472][ T8547] 8021q: adding VLAN 0 to HW filter on device team0 [ 221.528619][ T8401] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 221.544571][ T8395] device veth1_vlan entered promiscuous mode [ 221.557889][ T8393] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 221.574352][ T8393] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 221.583802][ T8393] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 221.592993][ T8393] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 221.604710][ T9669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 221.622260][ T9669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 221.630116][ T9669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 221.641386][ T9669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 221.662458][ T9669] Bluetooth: hci4: command 0x040f tx timeout [ 221.670711][ T9669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 221.680659][ T9669] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 221.689295][ T9669] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.696451][ T9669] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.704951][ T9669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 221.715905][ T9669] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 221.725242][ T9669] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.732360][ T9669] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.740073][ T9669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 221.802126][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 221.810133][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 221.819306][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 221.829428][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 221.839198][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 221.847899][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 221.856693][ T8399] device veth0_vlan entered promiscuous mode [ 221.903939][ T2957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 221.916585][ T2957] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 221.928254][ T2957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 221.940287][ T2957] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 221.968061][ T8547] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 221.978596][ T8547] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 221.996366][ T8397] device veth0_vlan entered promiscuous mode [ 222.013812][ T8399] device veth1_vlan entered promiscuous mode [ 222.021032][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 222.030080][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 222.040873][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 222.049286][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 222.057459][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 222.066483][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.075278][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 222.084353][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 222.093291][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 222.101603][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 222.143656][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 222.151350][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 222.173132][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 222.181651][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 222.191767][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 222.227742][ T8397] device veth1_vlan entered promiscuous mode [ 222.271155][ T8401] device veth0_vlan entered promiscuous mode [ 222.295003][ T8395] device veth0_macvtap entered promiscuous mode [ 222.315496][ T9647] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 222.332608][ T9647] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 222.340784][ T9647] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 222.353003][ T3183] Bluetooth: hci5: command 0x040f tx timeout [ 222.364686][ T9647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 222.393258][ T9647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 222.410014][ T9647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 222.426093][ T9647] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 222.481328][ T8395] device veth1_macvtap entered promiscuous mode [ 222.522918][ T8401] device veth1_vlan entered promiscuous mode [ 222.544334][ T9553] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 222.556843][ T9553] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 222.572003][ T9250] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 222.579435][ T9250] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 222.609204][ T8397] device veth0_macvtap entered promiscuous mode [ 222.635817][ T8399] device veth0_macvtap entered promiscuous mode [ 222.654958][ T9647] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 222.663232][ T9647] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 222.671715][ T9647] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 222.672453][ T9553] Bluetooth: hci0: command 0x0419 tx timeout [ 222.681314][ T9647] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 222.703228][ T8397] device veth1_macvtap entered promiscuous mode [ 222.713616][ T8547] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 222.724546][ T24] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 222.748011][ T8395] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 222.748157][ T24] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 222.790065][ T8395] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.814165][ T8395] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 222.824708][ T8399] device veth1_macvtap entered promiscuous mode [ 222.863800][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 222.877134][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 222.885941][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 222.895024][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 222.904361][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 222.918387][ T8395] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 222.929859][ T8395] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 222.946309][ T8395] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 222.986800][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 222.998590][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 223.019776][ T5] Bluetooth: hci1: command 0x0419 tx timeout [ 223.022786][ T8395] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 223.045216][ T8395] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 223.059171][ T8395] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 223.068360][ T8395] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 223.089567][ T8399] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 223.100399][ T8399] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 223.110755][ T8399] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 223.121684][ T8399] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 223.133501][ T8399] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 223.144553][ T8397] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 223.155728][ T9669] Bluetooth: hci2: command 0x0419 tx timeout [ 223.165039][ T8397] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 223.175471][ T8397] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 223.186775][ T8397] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 223.197071][ T8397] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 223.210916][ T8397] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 223.223123][ T8397] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 223.235443][ T8397] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 223.245967][ T8397] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 223.256101][ T8397] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 223.267419][ T8397] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 223.279920][ T8397] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 223.302043][ T24] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 223.310080][ T24] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 223.323775][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 223.335438][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 223.345608][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 223.354637][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 223.363798][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 223.373215][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 223.381735][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 223.391640][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 223.412642][ T8399] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 223.426602][ T8399] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 223.436666][ T8399] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 223.449586][ T8399] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 223.449623][ T8399] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 223.449638][ T8399] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 223.454503][ T8399] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 223.488105][ T9698] Bluetooth: hci3: command 0x0419 tx timeout [ 223.503242][ T8401] device veth0_macvtap entered promiscuous mode [ 223.511306][ T8399] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 223.528823][ T8399] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 223.538143][ T8399] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 223.549475][ T8399] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 223.562167][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 223.570039][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 223.579215][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 223.588045][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 223.599541][ T8397] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 223.609406][ T8397] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 223.627186][ T8397] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 223.640504][ T8397] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 223.674438][ T8401] device veth1_macvtap entered promiscuous mode [ 223.712728][ T9669] Bluetooth: hci4: command 0x0419 tx timeout [ 223.762520][ T9553] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 223.771200][ T9553] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 01:39:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) setsockopt$inet_tcp_int(r1, 0x6, 0x6, &(0x7f0000000000), 0x4) [ 223.934567][ T8401] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 223.953264][ T8401] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 223.981490][ T8401] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 224.019790][ T8401] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.062399][ T8401] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 224.080711][ T8401] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.091522][ T8401] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 224.102424][ T8401] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.118696][ T8401] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 224.148709][ T9620] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready 01:39:36 executing program 0: r0 = socket(0x29, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) [ 224.171165][ T9620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 224.200845][ T9620] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 224.210713][ T9620] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 224.231376][ T8401] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 224.254288][ T8401] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.282017][ T8401] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 224.302739][ T8401] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.320174][ T8401] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 01:39:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20a0, &(0x7f0000000180)={[], [{@context={'context', 0x3d, 'staff_u'}}]}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 224.332796][ T8401] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.343728][ T8401] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 224.371661][ T8401] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 224.393186][ T8401] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 224.411450][ T8547] device veth0_vlan entered promiscuous mode [ 224.431895][ T9669] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 224.439720][ T9669] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 224.461202][ T9669] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 224.465570][ T9764] SELinux: security_context_str_to_sid(staff_u) failed for (dev sda1, type ext4) errno=-22 [ 224.470664][ T9669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 224.512764][ T270] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 224.524439][ T8401] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 224.533638][ T9669] Bluetooth: hci5: command 0x0419 tx timeout [ 224.547842][ T9766] SELinux: security_context_str_to_sid(staff_u) failed for (dev sda1, type ext4) errno=-22 [ 224.561407][ T270] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 224.575292][ T8401] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 01:39:37 executing program 0: timer_settime(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x39000, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r4, 0x0, 0x110004, 0xf) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 224.605514][ T8401] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 224.625975][ T8401] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 224.664647][ T8547] device veth1_vlan entered promiscuous mode [ 224.721843][ T9698] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 224.729893][ T9698] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 224.779356][ T270] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 224.837238][ T270] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 224.867552][ T212] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 224.901743][ T212] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 224.953506][ T9545] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 224.987959][ T9545] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 225.044577][ T212] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 225.082671][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready 01:39:37 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000340)='./file0\x00', &(0x7f00000004c0)='trusted.overlay.redirect\x00', &(0x7f0000000480)='./file0\x00', 0x8, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) unlink(&(0x7f0000000100)='./bus/file0\x00') [ 225.091240][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 225.095172][ T212] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 225.146948][ T8547] device veth0_macvtap entered promiscuous mode [ 225.167232][ T85] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 225.174693][ T9698] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 225.186057][ T9698] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 225.191956][ T85] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 225.207702][ T9698] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 225.248847][ T8547] device veth1_macvtap entered promiscuous mode [ 225.292832][ T9817] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 225.320280][ T270] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 225.326974][ T9817] overlayfs: invalid redirect (./file0) [ 225.399001][ T270] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 225.440682][ T9817] overlayfs: filesystem on './bus' not supported as upperdir [ 225.448818][ T9826] overlayfs: invalid redirect (./file0) [ 225.467477][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 01:39:38 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000340)='./file0\x00', &(0x7f00000004c0)='trusted.overlay.redirect\x00', &(0x7f0000000480)='./file0\x00', 0x8, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) unlink(&(0x7f0000000100)='./bus/file0\x00') [ 225.500339][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 225.515441][ T8547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 225.540543][ T8547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 225.550980][ T8547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 225.564634][ T8547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 225.575028][ T8547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 225.588679][ T8547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 225.599193][ T8547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 225.612056][ T8547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 225.624265][ T8547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 225.669607][ T8547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 01:39:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x2, 0x8, 0x201}, 0x14}}, 0x0) [ 225.723606][ T8547] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 225.758041][ T9698] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 225.769820][ T9698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 225.786484][ T3112] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 225.851714][ T3112] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 225.860868][ T8547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 01:39:38 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x75f, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x5, 0x0, 0x8, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614a21d3dcf2b3e871587f53cd809f98e00", "f8b699c929b92ee722240b5b4c44a41eb88c87cff1866be0bec480ebc5c2189e", [0x0, 0x2d]}) [ 225.905288][ T8547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 225.926563][ T8547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 225.939735][ T8547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 225.962124][ T8547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 225.994312][ T8547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 226.009419][ T8547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 226.028747][ T8547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 226.053609][ T8547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 226.075214][ T8547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 226.105706][ T8547] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 226.143714][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 01:39:38 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000740)=[&(0x7f0000000080)='v.]\'\x00']) 01:39:38 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x140c1000, 0x0, 0x0, &(0x7f0000000300), 0x0) [ 226.160080][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 226.179722][ T35] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 226.193369][ T8547] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 226.229048][ T8547] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 226.241001][ T8547] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 226.257829][ T36] audit: type=1400 audit(1614821979.006:9): avc: denied { sys_admin } for pid=9848 comm="syz-executor.1" capability=21 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 [ 226.300309][ T8547] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 226.314320][ T9851] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. [ 226.359374][ T9851] overlayfs: invalid redirect (./file0) [ 226.396955][ T212] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 226.450280][ T212] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 226.505561][ T19] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 226.678253][ T212] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 226.703620][ T212] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 01:39:39 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) open$dir(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x0, 0x0, 0x0) [ 226.742868][ T9698] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 226.826412][ T212] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 226.836574][ T212] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 226.847156][ T9669] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 226.868973][ T9884] loop4: detected capacity change from 0 to 264192 01:39:39 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x24000054, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) close_range(r0, r0, 0x0) 01:39:39 executing program 3: r0 = creat(&(0x7f00000004c0)='./file0\x00', 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 01:39:39 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000340)='./file0\x00', &(0x7f00000004c0)='trusted.overlay.redirect\x00', &(0x7f0000000480)='./file0\x00', 0x8, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='lowerdir=.:file0']) mkdir(&(0x7f00000002c0)='./file1\x00', 0x0) creat(&(0x7f0000000180)='./bus/file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) unlink(&(0x7f0000000100)='./bus/file0\x00') 01:39:39 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x79, &(0x7f0000000040)=@assoc_value, 0x8) 01:39:39 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f0000000100)="e8", 0x1, 0x0, &(0x7f000052a000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000000), 0x8) 01:39:39 executing program 4: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 01:39:39 executing program 4: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000740)) 01:39:40 executing program 2: r0 = syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r1 = open$dir(&(0x7f0000000140)='.\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000200)='./file1\x00', r1, &(0x7f00000000c0)='./file0\x00') setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x0, 0x0, 0x3}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x0, 0x11, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x0, 0x81, 0x3) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x201608, 0x0, 0x0, 0x0) mbind(&(0x7f0000496000/0x1000)=nil, 0x1000, 0x0, 0x0, 0xfffff001, 0x5) 01:39:40 executing program 3: io_setup(0x4, &(0x7f0000000000)=0x0) r1 = memfd_create(&(0x7f0000000040)='X\\^/)$^,\x13\x00', 0x0) io_submit(r0, 0x1, &(0x7f00000001c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000700)="8fc082822c6a643263", 0x9}]) [ 227.222903][ T9904] overlayfs: fs on './file0' does not support file handles, falling back to index=off,nfs_export=off. 01:39:40 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB="850000007500000095"], &(0x7f0000000040)='GPL\x00', 0x4, 0x9c, &(0x7f0000000140)=""/156, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000fc0)={&(0x7f00000000c0)='sys_enter\x00', r0}, 0x10) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) 01:39:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, 0x1c) 01:39:40 executing program 0: r0 = socket(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff}}}, 0x24}}, 0x0) 01:39:40 executing program 4: r0 = socket(0x10, 0x803, 0x0) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r0, 0x894a, 0x0) [ 227.374767][ T9914] loop2: detected capacity change from 0 to 264192 01:39:40 executing program 1: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/vmci\x00', 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000140)=0xa0000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f00000000c0)={@local}) ioctl$IOCTL_VMCI_CTX_ADD_NOTIFICATION(r0, 0x7af, &(0x7f0000000000)={@hyper}) ioctl$IOCTL_VMCI_CTX_ADD_NOTIFICATION(r0, 0x7af, &(0x7f0000000180)={@my=0x0}) ioctl$IOCTL_VMCI_CTX_ADD_NOTIFICATION(r0, 0x7af, &(0x7f0000000040)={@host}) [ 227.476974][ T9914] mmap: syz-executor.2 (9914) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 01:39:40 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000004c80)={0x77359400}) 01:39:40 executing program 4: syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001500), 0x0, &(0x7f0000001540)={[], [{@dont_hash='dont_hash'}]}) 01:39:40 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x822b01) write$char_usb(r0, &(0x7f0000000040)="e2", 0x35000) write$evdev(r0, &(0x7f00000001c0)=[{{0x0, 0x2710}}], 0x10) 01:39:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0, 0x0) 01:39:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x6c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x44, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}, @AF_INET={0x38, 0x2, 0x0, 0x1, {0x34, 0x1, 0x0, 0x1, [{0x8, 0x19}, {0x8, 0x16}, {0x8, 0x1a}, {0xfffffffffffffd41}, {0x8}, {0x8}]}}]}, @IFLA_GROUP={0x8}]}, 0x6c}}, 0x0) 01:39:40 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r0, 0x402c5829, 0x0) [ 227.829990][ T9940] hfs: unable to parse mount options [ 227.909666][ C0] hrtimer: interrupt took 123439 ns [ 227.941920][ T9940] hfs: unable to parse mount options 01:39:40 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) set_mempolicy(0x2, &(0x7f0000000000)=0x10000101, 0x2) clone(0x4412c580, 0x0, 0x0, 0x0, 0x0) [ 228.000805][ T9949] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 228.050037][ T9949] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 228.065895][ T9949] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 228.247927][ T9962] IPVS: ftp: loaded support on port[0] = 21 [ 228.613759][ T9986] IPVS: ftp: loaded support on port[0] = 21 01:39:41 executing program 5: r0 = openat$vimc2(0xffffff9c, &(0x7f0000000300)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_S_EDID(r0, 0xc0245629, &(0x7f0000000380)={0x0, 0x0, 0x1000, [], 0x0}) 01:39:41 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r3, 0x0) dup2(r2, r3) 01:39:41 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc0a45320, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue0\x00'}) 01:39:41 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x2c]}}}, 0x49}]}) 01:39:41 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000a50000002a000000040000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x23, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 01:39:41 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) set_mempolicy(0x2, &(0x7f0000000000)=0x10000101, 0x2) clone(0x4412c580, 0x0, 0x0, 0x0, 0x0) [ 229.183044][T10023] tmpfs: Bad value for 'mpol' [ 229.199034][T10025] tmpfs: Bad value for 'mpol' 01:39:42 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x2c]}}}, 0x49}]}) 01:39:42 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x0) 01:39:42 executing program 2: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x12, &(0x7f00000000c0), &(0x7f0000000100)=0x14) [ 229.229929][T10021] IPVS: ftp: loaded support on port[0] = 21 01:39:42 executing program 5: r0 = openat$btrfs_control(0xffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x200040, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r0, 0x0) [ 229.436789][T10040] tmpfs: Bad value for 'mpol' 01:39:42 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x2c]}}}, 0x49}]}) 01:39:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, 0x0, &(0x7f0000000080)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getpid() perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e20, @broadcast}}, 0x0, 0x0, 0x8, 0xffffff55, 0x9, 0x2d9ad352, 0x3f}, 0x9c) 01:39:42 executing program 2: r0 = openat$mice(0xffffff9c, &(0x7f00000001c0)='/dev/input/mice\x00', 0x0) ppoll(&(0x7f0000000280)=[{r0, 0x8015}], 0x1, 0x0, 0x0, 0x0) [ 229.670242][T10063] tmpfs: Bad value for 'mpol' 01:39:43 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0x541b, 0x0) 01:39:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x6, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 01:39:43 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x2c]}}}, 0x49}]}) 01:39:43 executing program 4: perf_event_open(&(0x7f0000000280)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:39:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0xff}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) 01:39:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, 0x0, &(0x7f0000000080)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getpid() perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e20, @broadcast}}, 0x0, 0x0, 0x8, 0xffffff55, 0x9, 0x2d9ad352, 0x3f}, 0x9c) 01:39:43 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x2c]}}}, 0x49}]}) [ 230.413709][T10081] tmpfs: Bad value for 'mpol' 01:39:43 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmmsg(r0, &(0x7f0000008800)=[{{&(0x7f0000000040)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "74bc4a95a435c9b15cd8554f6c76ed13a977942eb94e62e9f7cc270f0c3b185c83278e12253a224b540a78c3f5b5a58e657a39316a33865309b02d7baed46c"}, 0x80, 0x0}}], 0x1, 0x0) 01:39:43 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x6c, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 01:39:43 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000240)=[{&(0x7f0000000000)="4c0000001200ff09ff3a150099a283ff07b8008000f0ffff000000060040150024001d001fc411a0b598bc593ab6821148a730cc33a49868c62b2ca654a6613b6aab", 0x42}, {&(0x7f0000000440)="0baba02e95c8c0408265", 0xa}], 0x2}, 0x0) 01:39:43 executing program 0: syz_mount_image$nilfs2(&(0x7f0000000000)='nilfs2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000010000)="020000000000343418010000e7306613e463cd13020000001f00000000000000000020000000000001000000000000001000000005000000010000000000000001000000000000000000000000000000e001000000000000571b675f00000000581b675f00000000581b675f000000000100320000000100571b675f00000000004eed0000000000000000000b00000080002000c0001000fe6e231969e44290b56efc3fe932f2d5", 0xa8, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='?']) [ 230.635217][T10091] tmpfs: Bad value for 'mpol' 01:39:43 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x2c]}}}, 0x49}]}) 01:39:43 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x2, 0x2812, r0, 0x0) open(0x0, 0x0, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000280)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) [ 230.793302][T10098] loop0: detected capacity change from 0 to 4 [ 230.815433][T10099] netlink: 'syz-executor.4': attribute type 29 has an invalid length. [ 230.830042][T10098] NILFS (loop0): unable to read secondary superblock (blocksize = 1024) [ 230.841302][T10098] NILFS (loop0): broken superblock, retrying with spare superblock (blocksize = 1024) [ 230.851062][T10098] NILFS (loop0): unrecognized mount option "?" [ 230.858249][T10099] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 230.869279][T10099] netlink: 'syz-executor.4': attribute type 29 has an invalid length. [ 230.877912][T10099] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 230.895686][T10102] netlink: 'syz-executor.4': attribute type 29 has an invalid length. [ 230.926883][T10102] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 230.936777][T10098] loop0: detected capacity change from 0 to 4 [ 230.942687][T10102] netlink: 'syz-executor.4': attribute type 29 has an invalid length. [ 230.964595][T10098] NILFS (loop0): unable to read secondary superblock (blocksize = 1024) 01:39:43 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ptype\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000440)=""/65, 0x41}], 0x1, 0x0, 0x0) [ 231.019747][T10102] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 231.032730][T10109] tmpfs: Bad value for 'mpol' [ 231.050617][T10098] NILFS (loop0): broken superblock, retrying with spare superblock (blocksize = 1024) [ 231.060198][T10098] NILFS (loop0): unrecognized mount option "?" 01:39:43 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000a40)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e) 01:39:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000500)={0x0, 0x0}, 0x8) 01:39:43 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x2c]}}}, 0x49}]}) 01:39:44 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f0000000180)='/proc/meminfo\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002d40)={0x2020}, 0x2020) 01:39:44 executing program 1: syz_mount_image$affs(&(0x7f00000000c0)='affs\x00', &(0x7f0000000100)='.\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)={[{'\\@($,+\xaf*\\$\'{*-]%'}]}) [ 231.332735][T10122] tmpfs: Bad value for 'mpol' [ 231.463155][T10126] affs: Unrecognized mount option "\@($" or missing value [ 231.487338][T10126] affs: Error parsing options [ 231.570825][T10126] affs: Unrecognized mount option "\@($" or missing value [ 231.599652][T10126] affs: Error parsing options 01:39:46 executing program 2: get_mempolicy(0x0, &(0x7f0000000040), 0x1, &(0x7f0000ffb000/0x4000)=nil, 0x0) 01:39:46 executing program 0: r0 = socket(0x1e, 0x805, 0x0) getpeername$inet(r0, 0x0, 0x0) 01:39:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00', 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x14, r1, 0x1, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 01:39:46 executing program 3: clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x2c]}}}, 0x49}]}) 01:39:46 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) getsockopt$bt_BT_POWER(r0, 0x112, 0x4, 0x0, &(0x7f0000000040)) 01:39:46 executing program 1: perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="34000000100001080000000000000000df000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000c002b800800d427", @ANYRES32, @ANYBLOB="08001b00"], 0x34}}, 0x0) 01:39:46 executing program 3: clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x2c]}}}, 0x49}]}) [ 233.604647][T10149] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 01:39:46 executing program 0: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0x402c560b, 0x0) 01:39:46 executing program 5: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001340)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8, 0x1, 'gtp\x00'}, {0x14, 0x2, 0x0, 0x1, {{0x8}, {0x8}}}}}, @IFLA_MASTER={0x8, 0xa, r2}]}, 0x48}}, 0x0) [ 233.664506][T10149] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 01:39:46 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 01:39:46 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x407fffffff, 0x1, &(0x7f0000000280)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}], 0x0, &(0x7f00000009c0)=ANY=[]) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) socket(0x1, 0x5, 0x0) 01:39:46 executing program 3: clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x2c]}}}, 0x49}]}) [ 233.713907][T10149] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 01:39:46 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 233.843911][T10167] loop2: detected capacity change from 0 to 264192 01:39:46 executing program 2: r0 = openat$vmci(0xffffff9c, &(0x7f0000000240)='/dev/vmci\x00', 0x2, 0x0) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r0, 0x8008f512, 0x0) 01:39:46 executing program 3: mknod$loop(0x0, 0x0, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x2c]}}}, 0x49}]}) 01:39:46 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000600)) [ 233.989182][T10178] loop4: detected capacity change from 0 to 1024 01:39:46 executing program 3: mknod$loop(0x0, 0x0, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x2c]}}}, 0x49}]}) [ 234.072605][T10186] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 234.113857][T10178] EXT4-fs (loop4): Test dummy encryption mode enabled [ 234.171938][T10178] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 234.184846][T10186] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 234.220771][T10186] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 234.259945][T10178] EXT4-fs error (device loop4): ext4_fill_super:4942: inode #2: comm syz-executor.4: iget: root inode unallocated 01:39:47 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {&(0x7f0000010a00)="1797f96f00000000001000000000000002000000000000000d0000001000000012000000000000000100000002000000ffffffffffffffffffffffffffffffffffffffff01000000000000000000000000000000030000000b00000005000000ffffffffffffffffffffffffffffffffffffffff010000000000000000000000000000008501000006000000010000000100000001000000040000004000000040000000fc0f", 0xa6, 0x200000}, {&(0x7f0000010b00)="0000000000000000000000000000000000000000000000000000000080d87d5a", 0x20, 0x200fe0}, {&(0x7f0000010c00)="000000000000000000000000000000000000000000000000000000060000000000010c80", 0x24, 0x2011e0}, {&(0x7f0000010d00)="000000000000000000000001", 0xc, 0x201240}, {&(0x7f0000010e00)="0000000000000000000000000000000000000000000000000002", 0x1a, 0x201280}, {&(0x7f0000010f00)="0000000000000003", 0x8, 0x2012e0}, {&(0x7f0000011000)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v', 0x16, 0x201320}, {&(0x7f0000011100)="00000005", 0x4, 0x201380}, {&(0x7f0000011600)="00000000000000000000000000000000000000000000000000000001000000001797f96f00000000001000000000000002000000000000000d0000001000000012000000000000000100000002000000ffffffffffffffffffffffffffffffffffffffff01000000000000000000000000000000030000000b00000005000000ffffffffffffffffffffffffffffffffffffffff010000000000000000000000000000008501000006000000010000000100000001000000040000004000000040000000fc0f", 0xc6, 0x204fe0}, {&(0x7f0000011700)="0000000000000000000000000000000000000000000000000000000080d87d5a", 0x20, 0x205fe0}, {0x0, 0x0, 0x3ff000}], 0x0, &(0x7f0000000040)) 01:39:47 executing program 2: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xb) 01:39:47 executing program 3: mknod$loop(0x0, 0x0, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x2c]}}}, 0x49}]}) [ 234.306617][T10178] EXT4-fs (loop4): get root inode failed [ 234.313844][T10178] EXT4-fs (loop4): mount failed [ 234.386084][T10178] loop4: detected capacity change from 0 to 1024 [ 234.423767][T10178] EXT4-fs (loop4): Test dummy encryption mode enabled 01:39:47 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000fc0)={&(0x7f00000000c0)='sys_enter\x00', r0}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) setresgid(0x0, 0x0, 0x0) 01:39:47 executing program 2: pipe2(&(0x7f0000000340)={0xffffffffffffffff}, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000380)='/dev/cec#\x00', 0x1, 0x2) ppoll(&(0x7f0000000500)=[{r0}, {r1}], 0x2, &(0x7f0000000580), 0x0, 0x0) 01:39:47 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8a10}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000002c0)={'syztnl0\x00', &(0x7f00000003c0)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5d6, 0x690, {{0xb, 0x4, 0x3, 0x0, 0x2c, 0x64, 0x0, 0x98, 0x29, 0x0, @local, @loopback, {[@timestamp={0x44, 0x14, 0x43, 0x0, 0x7, [0x0, 0x3, 0x6, 0x7]}, @noop, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000004c0)={'syztnl0\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x700, 0x40, 0x5, 0x42, {{0xc, 0x4, 0x0, 0x1, 0x30, 0x64, 0x0, 0x3f, 0x2f, 0x0, @multicast1, @rand_addr=0x64010102, {[@lsrr={0x83, 0x17, 0xdc, [@empty, @dev={0xac, 0x14, 0x14, 0x25}, @empty, @local, @empty]}, @ra={0x94, 0x4, 0x1}]}}}}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@private0}}, &(0x7f0000000600)=0xe4) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @private=0xa010100}]}}}, @IFLA_MASTER={0x8, 0x3, r6}]}, 0x40}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x1, 0x803, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @private=0xa010100}]}}}, @IFLA_MASTER={0x8, 0x3, r9}]}, 0x40}}, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000840)={&(0x7f0000000640)={0x1e0, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x4000}, 0x8040) open(0x0, 0x141042, 0x0) ioctl$VIDIOC_G_CTRL(0xffffffffffffffff, 0xc008561b, &(0x7f0000000380)={0x9f99800}) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x28, 0x0, 0xa00, 0x70bd2c, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @empty}]}, 0x28}}, 0x200000c0) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x0, 0x0) [ 234.463640][T10178] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 234.480524][T10212] loop1: detected capacity change from 0 to 16368 [ 234.494144][T10212] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 234.502379][T10212] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock [ 234.504706][T10178] EXT4-fs: failed to create workqueue [ 234.513163][T10212] F2FS-fs (loop1): invalid crc_offset: 0 [ 234.551766][T10178] EXT4-fs (loop4): mount failed [ 234.611075][T10212] attempt to access beyond end of device [ 234.611075][T10212] loop1: rw=12288, want=20488, limit=16368 01:39:47 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x2c]}}}, 0x49}]}) 01:39:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:39:47 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) dup3(r3, r2, 0x0) [ 234.660294][T10226] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 234.697788][T10226] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 234.721641][T10212] attempt to access beyond end of device [ 234.721641][T10212] loop1: rw=12288, want=20496, limit=16368 [ 234.724014][T10226] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 01:39:47 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x12, 0x0, &(0x7f0000000100)) [ 234.799062][T10212] attempt to access beyond end of device [ 234.799062][T10212] loop1: rw=12288, want=20504, limit=16368 [ 234.865175][T10234] tmpfs: Bad value for 'mpol' [ 234.879484][T10212] attempt to access beyond end of device [ 234.879484][T10212] loop1: rw=12288, want=20512, limit=16368 [ 234.910385][T10241] loop4: detected capacity change from 0 to 1024 01:39:47 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b603803123f6ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c26a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) sendfile(r0, r1, 0x0, 0x10000) 01:39:47 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x2c]}}}, 0x49}]}) [ 234.943675][T10241] EXT4-fs (loop4): Test dummy encryption mode enabled [ 234.951324][T10212] attempt to access beyond end of device [ 234.951324][T10212] loop1: rw=12288, want=20520, limit=16368 [ 234.998303][T10212] attempt to access beyond end of device [ 234.998303][T10212] loop1: rw=12288, want=20528, limit=16368 [ 235.010218][T10212] attempt to access beyond end of device [ 235.010218][T10212] loop1: rw=12288, want=20536, limit=16368 [ 235.015519][T10241] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 235.021971][T10212] attempt to access beyond end of device [ 235.021971][T10212] loop1: rw=12288, want=20544, limit=16368 [ 235.085688][T10212] attempt to access beyond end of device [ 235.085688][T10212] loop1: rw=12288, want=20488, limit=16368 [ 235.108537][T10241] EXT4-fs error (device loop4): ext4_fill_super:4942: inode #2: comm syz-executor.4: iget: root inode unallocated [ 235.143123][T10241] EXT4-fs (loop4): get root inode failed [ 235.151392][T10212] attempt to access beyond end of device [ 235.151392][T10212] loop1: rw=12288, want=20488, limit=16368 [ 235.164677][T10212] F2FS-fs (loop1): NAT is corrupt, run fsck to fix it [ 235.173594][T10212] F2FS-fs (loop1): Failed to initialize F2FS node manager (-5) [ 235.190105][T10241] EXT4-fs (loop4): mount failed [ 235.245479][ T36] audit: type=1804 audit(1614821987.998:10): pid=10255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir558577750/syzkaller.1J7vGN/18/file0" dev="sda1" ino=14219 res=1 errno=0 [ 235.283797][T10212] loop1: detected capacity change from 0 to 16368 [ 235.294723][T10256] tmpfs: Bad value for 'mpol' [ 235.304174][T10212] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 235.324619][T10212] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock [ 235.336431][T10212] F2FS-fs (loop1): invalid crc_offset: 0 [ 235.360317][T10212] F2FS-fs (loop1): NAT is corrupt, run fsck to fix it [ 235.367181][T10212] F2FS-fs (loop1): Failed to initialize F2FS node manager (-5) 01:39:48 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 01:39:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(camellia)\x00'}, 0x58) 01:39:48 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 01:39:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:39:48 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x2c]}}}, 0x49}]}) 01:39:48 executing program 0: gettid() r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000dc0)=ANY=[@ANYBLOB="2321202e2f66696c653020f004d336b04b037e4555a763c15ceda005e276ed3ae7a290ab0e7446771332825e4577124d1a2e21da765cd1ce2356a8f856f0bf887ecc714959771b65d33e129933dd93f99f03cd6b3e5903e1ddb592a67f706eb14c1d3d1a204fe2e9c50d7920f632198d2c7faba4084e7a3b0c6c699890e19745ba9a37cfdd92ef3b7ff58b659bbf65c6a2b2e441a0e0c44a3d9abeb7d90f0e077d0d67096da85a6d22c36fac7505a35892211b5194d55e0ad396b242ac56b00fbd89c9ff98e0fb6f9ab48e8f83bfcc45"], 0x191) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000004c0)=[&(0x7f0000000780)='{C\xfc\xf1%B\x90\x9b\xd7i\xe3#\x00\xe6P\xd5\xd7\xdb\xd2\xeb\xac2\x1c\xd8\xe1\xfd\nl\xc1\xa4=E\xf7\x9a\x94\xa1\xfb\xe2\x9d\xc1V@e\xdd+\x0e\xe9\xce\xfc\xeb\a\x87=\xb4\xf3\x8a\xe5\xf8F\x18\xac\a=)7\x1e\xd4\x14\x97#\x1b!\xd4\x8c\xe9\xf6\xc7\xe9{\xe8*\x0f\xd7\x84*\xb4/\x84\x1ck\x80\xb2m\xe2\x00\x1e\xbf\xaf\x985\x12\x92\x04\xdc\x04\'2\x94\xb6T\xfa\x89\v\x16\xcc\xbaI\x87\x02]HH~M\x96\xb9}\xe7#\xc61\xa5\xa4\xde-%\xf2\x91\xbd\xd5p\xbd\xa4\x05X \xa2L\t0\x8d\x84\xa8*V{\xd4\xd5c\xc89\x8b_\x90\f\xbc\xa5\xed\xbb\xef \xb0[L\xa1\xd4\xcar\xf0\xc8oz\xe4i\xc0\xbf\xdd\xcey\x05`\xb5\xa3\xed2n \xb5\x13yU\x00\xf2\f\xd6\r\x03\x99V\x1c\x9b9\xdb\xae\xd7(\xa5\xec\x93\xa4\x12\xa0I\x80\x99\x83A\xd8\v\bI\x85\xe7\xf6\t\xe8\xf6\xa7\x02vG\x8a=L\x16\x11\\b', &(0x7f00000000c0)='\\//\x00'], &(0x7f0000000740)=[&(0x7f0000000500)='ity.capability\x00\x00\x00\x00\x00\x00D\xd9O\xd5\xc3\xbf\xf4r7\x9e9\x1aof\xe7\xf0vg\x12\xe8`\x19x\xbe\xdb$3\x17\xc6\xdac\xac\xa0\x9e\x9e\xaa\x90\x9f\x1d\x05|*\n\xc7\rY\xb9\x04n\xca\x00n\x0f\xcf=\x92\x13\xf9\x7f\xb6\xc6\xd7Z\xa2\xcc\x19\t\xe9\"pc\xa2\xa34\x0f\x18BK^\a\xac\xafj\xb10G\xfb\xb0\xe5\x19\x0f\x81[N\x82\xbf-r\x00', &(0x7f0000000080)='v.]\'\x00', &(0x7f0000000680)=',\xce\\$+%&+\\\xbd\x00', &(0x7f00000006c0)='\xe5', &(0x7f0000000700)='security.capabilitY\x00']) [ 235.573143][T10273] tmpfs: Bad value for 'mpol' [ 235.618789][T10277] loop4: detected capacity change from 0 to 1024 01:39:48 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x0, 0x0, 0x0) getsockname$packet(r1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$NLBL_MGMT_C_ADD(0xffffffffffffffff, 0x0, 0x200000c0) socket$nl_route(0x10, 0x3, 0x0) [ 235.673134][T10277] EXT4-fs (loop4): Test dummy encryption mode enabled 01:39:48 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, 0x0, &(0x7f0000000240)='tmpfs\x00', 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x2c]}}}, 0x49}]}) 01:39:48 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0185648, &(0x7f0000000080)={0x980000, 0xad, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x0, 0x0, [], @string=0x0}}) [ 235.755498][T10277] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 235.819198][T10277] EXT4-fs error (device loop4): ext4_fill_super:4942: inode #2: comm syz-executor.4: iget: root inode unallocated [ 235.845090][T10289] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 01:39:48 executing program 0: gettid() r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000dc0)=ANY=[@ANYBLOB="2321202e2f66696c653020f004d336b04b037e4555a763c15ceda005e276ed3ae7a290ab0e7446771332825e4577124d1a2e21da765cd1ce2356a8f856f0bf887ecc714959771b65d33e129933dd93f99f03cd6b3e5903e1ddb592a67f706eb14c1d3d1a204fe2e9c50d7920f632198d2c7faba4084e7a3b0c6c699890e19745ba9a37cfdd92ef3b7ff58b659bbf65c6a2b2e441a0e0c44a3d9abeb7d90f0e077d0d67096da85a6d22c36fac7505a35892211b5194d55e0ad396b242ac56b00fbd89c9ff98e0fb6f9ab48e8f83bfcc45"], 0x191) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000004c0)=[&(0x7f0000000780)='{C\xfc\xf1%B\x90\x9b\xd7i\xe3#\x00\xe6P\xd5\xd7\xdb\xd2\xeb\xac2\x1c\xd8\xe1\xfd\nl\xc1\xa4=E\xf7\x9a\x94\xa1\xfb\xe2\x9d\xc1V@e\xdd+\x0e\xe9\xce\xfc\xeb\a\x87=\xb4\xf3\x8a\xe5\xf8F\x18\xac\a=)7\x1e\xd4\x14\x97#\x1b!\xd4\x8c\xe9\xf6\xc7\xe9{\xe8*\x0f\xd7\x84*\xb4/\x84\x1ck\x80\xb2m\xe2\x00\x1e\xbf\xaf\x985\x12\x92\x04\xdc\x04\'2\x94\xb6T\xfa\x89\v\x16\xcc\xbaI\x87\x02]HH~M\x96\xb9}\xe7#\xc61\xa5\xa4\xde-%\xf2\x91\xbd\xd5p\xbd\xa4\x05X \xa2L\t0\x8d\x84\xa8*V{\xd4\xd5c\xc89\x8b_\x90\f\xbc\xa5\xed\xbb\xef \xb0[L\xa1\xd4\xcar\xf0\xc8oz\xe4i\xc0\xbf\xdd\xcey\x05`\xb5\xa3\xed2n \xb5\x13yU\x00\xf2\f\xd6\r\x03\x99V\x1c\x9b9\xdb\xae\xd7(\xa5\xec\x93\xa4\x12\xa0I\x80\x99\x83A\xd8\v\bI\x85\xe7\xf6\t\xe8\xf6\xa7\x02vG\x8a=L\x16\x11\\b', &(0x7f00000000c0)='\\//\x00'], &(0x7f0000000740)=[&(0x7f0000000500)='ity.capability\x00\x00\x00\x00\x00\x00D\xd9O\xd5\xc3\xbf\xf4r7\x9e9\x1aof\xe7\xf0vg\x12\xe8`\x19x\xbe\xdb$3\x17\xc6\xdac\xac\xa0\x9e\x9e\xaa\x90\x9f\x1d\x05|*\n\xc7\rY\xb9\x04n\xca\x00n\x0f\xcf=\x92\x13\xf9\x7f\xb6\xc6\xd7Z\xa2\xcc\x19\t\xe9\"pc\xa2\xa34\x0f\x18BK^\a\xac\xafj\xb10G\xfb\xb0\xe5\x19\x0f\x81[N\x82\xbf-r\x00', &(0x7f0000000080)='v.]\'\x00', &(0x7f0000000680)=',\xce\\$+%&+\\\xbd\x00', &(0x7f00000006c0)='\xe5', &(0x7f0000000700)='security.capabilitY\x00']) 01:39:48 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, 0x0, &(0x7f0000000240)='tmpfs\x00', 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x2c]}}}, 0x49}]}) [ 235.914930][T10289] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 235.947752][T10277] EXT4-fs (loop4): get root inode failed [ 236.007948][T10277] EXT4-fs (loop4): mount failed [ 236.015914][T10289] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 01:39:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000140)={0x20}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) 01:39:48 executing program 0: gettid() r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000dc0)=ANY=[@ANYBLOB="2321202e2f66696c653020f004d336b04b037e4555a763c15ceda005e276ed3ae7a290ab0e7446771332825e4577124d1a2e21da765cd1ce2356a8f856f0bf887ecc714959771b65d33e129933dd93f99f03cd6b3e5903e1ddb592a67f706eb14c1d3d1a204fe2e9c50d7920f632198d2c7faba4084e7a3b0c6c699890e19745ba9a37cfdd92ef3b7ff58b659bbf65c6a2b2e441a0e0c44a3d9abeb7d90f0e077d0d67096da85a6d22c36fac7505a35892211b5194d55e0ad396b242ac56b00fbd89c9ff98e0fb6f9ab48e8f83bfcc45"], 0x191) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000004c0)=[&(0x7f0000000780)='{C\xfc\xf1%B\x90\x9b\xd7i\xe3#\x00\xe6P\xd5\xd7\xdb\xd2\xeb\xac2\x1c\xd8\xe1\xfd\nl\xc1\xa4=E\xf7\x9a\x94\xa1\xfb\xe2\x9d\xc1V@e\xdd+\x0e\xe9\xce\xfc\xeb\a\x87=\xb4\xf3\x8a\xe5\xf8F\x18\xac\a=)7\x1e\xd4\x14\x97#\x1b!\xd4\x8c\xe9\xf6\xc7\xe9{\xe8*\x0f\xd7\x84*\xb4/\x84\x1ck\x80\xb2m\xe2\x00\x1e\xbf\xaf\x985\x12\x92\x04\xdc\x04\'2\x94\xb6T\xfa\x89\v\x16\xcc\xbaI\x87\x02]HH~M\x96\xb9}\xe7#\xc61\xa5\xa4\xde-%\xf2\x91\xbd\xd5p\xbd\xa4\x05X \xa2L\t0\x8d\x84\xa8*V{\xd4\xd5c\xc89\x8b_\x90\f\xbc\xa5\xed\xbb\xef \xb0[L\xa1\xd4\xcar\xf0\xc8oz\xe4i\xc0\xbf\xdd\xcey\x05`\xb5\xa3\xed2n \xb5\x13yU\x00\xf2\f\xd6\r\x03\x99V\x1c\x9b9\xdb\xae\xd7(\xa5\xec\x93\xa4\x12\xa0I\x80\x99\x83A\xd8\v\bI\x85\xe7\xf6\t\xe8\xf6\xa7\x02vG\x8a=L\x16\x11\\b', &(0x7f00000000c0)='\\//\x00'], &(0x7f0000000740)=[&(0x7f0000000500)='ity.capability\x00\x00\x00\x00\x00\x00D\xd9O\xd5\xc3\xbf\xf4r7\x9e9\x1aof\xe7\xf0vg\x12\xe8`\x19x\xbe\xdb$3\x17\xc6\xdac\xac\xa0\x9e\x9e\xaa\x90\x9f\x1d\x05|*\n\xc7\rY\xb9\x04n\xca\x00n\x0f\xcf=\x92\x13\xf9\x7f\xb6\xc6\xd7Z\xa2\xcc\x19\t\xe9\"pc\xa2\xa34\x0f\x18BK^\a\xac\xafj\xb10G\xfb\xb0\xe5\x19\x0f\x81[N\x82\xbf-r\x00', &(0x7f0000000080)='v.]\'\x00', &(0x7f0000000680)=',\xce\\$+%&+\\\xbd\x00', &(0x7f00000006c0)='\xe5', &(0x7f0000000700)='security.capabilitY\x00']) 01:39:48 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9, 0xfffffffffffffe82, &(0x7f00000001c0)="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", 0x0}, 0x48) 01:39:48 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, 0x0, &(0x7f0000000240)='tmpfs\x00', 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x2c]}}}, 0x49}]}) 01:39:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:39:49 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x1) 01:39:49 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x2c]}}}, 0x49}]}) 01:39:49 executing program 0: gettid() r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000dc0)=ANY=[@ANYBLOB="2321202e2f66696c653020f004d336b04b037e4555a763c15ceda005e276ed3ae7a290ab0e7446771332825e4577124d1a2e21da765cd1ce2356a8f856f0bf887ecc714959771b65d33e129933dd93f99f03cd6b3e5903e1ddb592a67f706eb14c1d3d1a204fe2e9c50d7920f632198d2c7faba4084e7a3b0c6c699890e19745ba9a37cfdd92ef3b7ff58b659bbf65c6a2b2e441a0e0c44a3d9abeb7d90f0e077d0d67096da85a6d22c36fac7505a35892211b5194d55e0ad396b242ac56b00fbd89c9ff98e0fb6f9ab48e8f83bfcc45"], 0x191) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000004c0)=[&(0x7f0000000780)='{C\xfc\xf1%B\x90\x9b\xd7i\xe3#\x00\xe6P\xd5\xd7\xdb\xd2\xeb\xac2\x1c\xd8\xe1\xfd\nl\xc1\xa4=E\xf7\x9a\x94\xa1\xfb\xe2\x9d\xc1V@e\xdd+\x0e\xe9\xce\xfc\xeb\a\x87=\xb4\xf3\x8a\xe5\xf8F\x18\xac\a=)7\x1e\xd4\x14\x97#\x1b!\xd4\x8c\xe9\xf6\xc7\xe9{\xe8*\x0f\xd7\x84*\xb4/\x84\x1ck\x80\xb2m\xe2\x00\x1e\xbf\xaf\x985\x12\x92\x04\xdc\x04\'2\x94\xb6T\xfa\x89\v\x16\xcc\xbaI\x87\x02]HH~M\x96\xb9}\xe7#\xc61\xa5\xa4\xde-%\xf2\x91\xbd\xd5p\xbd\xa4\x05X \xa2L\t0\x8d\x84\xa8*V{\xd4\xd5c\xc89\x8b_\x90\f\xbc\xa5\xed\xbb\xef \xb0[L\xa1\xd4\xcar\xf0\xc8oz\xe4i\xc0\xbf\xdd\xcey\x05`\xb5\xa3\xed2n \xb5\x13yU\x00\xf2\f\xd6\r\x03\x99V\x1c\x9b9\xdb\xae\xd7(\xa5\xec\x93\xa4\x12\xa0I\x80\x99\x83A\xd8\v\bI\x85\xe7\xf6\t\xe8\xf6\xa7\x02vG\x8a=L\x16\x11\\b', &(0x7f00000000c0)='\\//\x00'], &(0x7f0000000740)=[&(0x7f0000000500)='ity.capability\x00\x00\x00\x00\x00\x00D\xd9O\xd5\xc3\xbf\xf4r7\x9e9\x1aof\xe7\xf0vg\x12\xe8`\x19x\xbe\xdb$3\x17\xc6\xdac\xac\xa0\x9e\x9e\xaa\x90\x9f\x1d\x05|*\n\xc7\rY\xb9\x04n\xca\x00n\x0f\xcf=\x92\x13\xf9\x7f\xb6\xc6\xd7Z\xa2\xcc\x19\t\xe9\"pc\xa2\xa34\x0f\x18BK^\a\xac\xafj\xb10G\xfb\xb0\xe5\x19\x0f\x81[N\x82\xbf-r\x00', &(0x7f0000000080)='v.]\'\x00', &(0x7f0000000680)=',\xce\\$+%&+\\\xbd\x00', &(0x7f00000006c0)='\xe5', &(0x7f0000000700)='security.capabilitY\x00']) 01:39:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 236.448687][T10333] loop4: detected capacity change from 0 to 1024 [ 236.506116][T10333] EXT4-fs (loop4): Test dummy encryption mode enabled [ 236.551962][T10333] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 01:39:49 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(r0, 0x8925, 0x0) [ 236.612199][T10333] EXT4-fs error (device loop4): ext4_fill_super:4942: inode #2: comm syz-executor.4: iget: root inode unallocated 01:39:49 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x2c]}}}, 0x49}]}) 01:39:49 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_io_uring_setup(0x1d8f, &(0x7f0000001280), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000001300), &(0x7f0000001340)) sendmsg$unix(r0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=[@rights={{0x14, 0x1, 0x1, [r1, r2]}}], 0x14}, 0x0) [ 236.686466][T10333] EXT4-fs (loop4): get root inode failed [ 236.734622][T10348] loop2: detected capacity change from 0 to 140 [ 236.742299][T10333] EXT4-fs (loop4): mount failed 01:39:49 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x2c]}}}, 0x49}]}) [ 236.806394][T10348] EXT4-fs error (device loop2): ext4_fill_super:4942: inode #2: comm syz-executor.2: iget: checksum invalid 01:39:49 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, 0x0) [ 236.876405][T10348] EXT4-fs (loop2): get root inode failed [ 236.950351][T10348] EXT4-fs (loop2): mount failed 01:39:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:39:49 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) close_range(0xffffffffffffffff, r0, 0x0) 01:39:49 executing program 1: sigaltstack(&(0x7f0000ffe000/0x2000)=nil, 0x0) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000001) [ 237.038211][T10348] loop2: detected capacity change from 0 to 140 [ 237.072593][T10348] EXT4-fs error (device loop2): ext4_fill_super:4942: inode #2: comm syz-executor.2: iget: checksum invalid [ 237.097175][T10348] EXT4-fs (loop2): get root inode failed [ 237.104969][T10348] EXT4-fs (loop2): mount failed [ 237.135557][T10380] loop4: detected capacity change from 0 to 1024 01:39:50 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x13, 0x0, 0x0) 01:39:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:39:50 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:39:50 executing program 0: r0 = socket(0x40000000002, 0x3, 0x2) recvmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x1, 0x0) 01:39:50 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, 0x0) 01:39:50 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x8008af26, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) [ 237.575509][T10397] loop4: detected capacity change from 0 to 1024 [ 237.599580][T10402] loop2: detected capacity change from 0 to 140 [ 237.613963][T10402] EXT4-fs error (device loop2): ext4_fill_super:4942: inode #2: comm syz-executor.2: iget: checksum invalid 01:39:50 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, 0x0) [ 237.626166][T10402] EXT4-fs (loop2): get root inode failed [ 237.640701][T10402] EXT4-fs (loop2): mount failed 01:39:50 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', 0x0, 0x0, 0x0) 01:39:50 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:39:50 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000007, 0x800000000009031, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_JOIN_MESH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x28, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}]}, 0x28}}, 0x0) 01:39:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0x4}}}]}, 0x34}}, 0x0) 01:39:50 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, &(0x7f0000000040)) 01:39:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:39:50 executing program 1: r0 = socket(0x40000000002, 0x3, 0x80000000002) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000280)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @loopback}}) 01:39:50 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, &(0x7f0000000040)) 01:39:50 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, &(0x7f0000000040)) [ 237.934676][T10428] loop4: detected capacity change from 0 to 1024 01:39:50 executing program 5: openat$nvram(0xffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x4e80, 0x0) [ 238.088604][T10439] loop2: detected capacity change from 0 to 140 01:39:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:39:50 executing program 1: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000200)={0x6}, &(0x7f00000001c0)={0x1}, &(0x7f0000009d40)={0x77359400}, 0x0) [ 238.232141][T10439] EXT4-fs error (device loop2): ext4_fill_super:4942: inode #2: comm syz-executor.2: iget: checksum invalid 01:39:51 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative'}}, 0x49}]}) [ 238.300775][T10439] EXT4-fs (loop2): get root inode failed 01:39:51 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0xd, &(0x7f0000000040)=@assoc_value, 0x8) [ 238.344971][T10439] EXT4-fs (loop2): mount failed [ 238.486644][T10456] loop4: detected capacity change from 0 to 1024 [ 238.555542][T10461] tmpfs: Bad value for 'mpol' 01:39:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:39:51 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0xd, 0x0, 0x0) 01:39:51 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative'}}, 0x49}]}) 01:39:51 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x0, 0x0) 01:39:51 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8a10}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000002c0)={'syztnl0\x00', &(0x7f00000003c0)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5d6, 0x690, {{0xb, 0x4, 0x3, 0x0, 0x2c, 0x64, 0x0, 0x98, 0x29, 0x0, @local, @loopback, {[@timestamp={0x44, 0x14, 0x43, 0x0, 0x7, [0x400, 0x3, 0x6, 0x7]}, @noop, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000004c0)={'syztnl0\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x700, 0x40, 0x5, 0x42, {{0xc, 0x4, 0x0, 0x1, 0x30, 0x64, 0x0, 0x3f, 0x2f, 0x0, @multicast1, @rand_addr=0x64010102, {[@lsrr={0x83, 0x17, 0xdc, [@empty, @dev={0xac, 0x14, 0x14, 0x25}, @empty, @local, @empty]}, @ra={0x94, 0x4, 0x1}]}}}}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@private0}}, &(0x7f0000000600)=0xe4) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @private=0xa010100}]}}}, @IFLA_MASTER={0x8, 0x3, r6}]}, 0x40}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x1, 0x803, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @private=0xa010100}]}}}, @IFLA_MASTER={0x8, 0x3, r9}]}, 0x40}}, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000840)={&(0x7f0000000640)={0x1e0, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x4000}, 0x8040) open(0x0, 0x141042, 0x0) ioctl$VIDIOC_G_CTRL(0xffffffffffffffff, 0xc008561b, &(0x7f0000000380)={0x9f99800}) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x0, 0x0) 01:39:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:39:52 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative'}}, 0x49}]}) [ 239.308569][T10477] loop2: detected capacity change from 0 to 140 [ 239.318460][T10480] loop4: detected capacity change from 0 to 1024 [ 239.325903][T10478] tmpfs: Bad value for 'mpol' [ 239.404554][T10477] EXT4-fs error (device loop2): ext4_fill_super:4942: inode #2: comm syz-executor.2: iget: checksum invalid 01:39:52 executing program 1: syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000180)={[{@gid={'gid', 0x3d, 0xffffffffffffffff}}]}) 01:39:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 239.507523][T10477] EXT4-fs (loop2): get root inode failed [ 239.539248][T10489] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 01:39:52 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="50000000020601"], 0x50}}, 0x0) [ 239.567760][T10477] EXT4-fs (loop2): mount failed 01:39:52 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x0]}}}, 0x49}]}) [ 239.600402][T10492] tmpfs: Bad value for 'mpol' [ 239.614431][T10489] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 239.669851][T10489] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 239.718408][T10503] loop4: detected capacity change from 0 to 1024 01:39:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 239.783765][T10512] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.5'. [ 239.829529][T10514] tmpfs: Bad value for 'mpol' 01:39:52 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:39:52 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x2f802900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='tmpfs\x00', 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x0]}}}, 0x49}]}) 01:39:52 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x30a, &(0x7f00000001c0)={&(0x7f00000003c0)=@newlink={0x68, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2325}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x1a}}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r1}, @IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x68}}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) 01:39:52 executing program 5: r0 = openat$vnet(0xffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$vhost_msg_v2(r0, 0x0, 0x0) [ 240.015131][T10519] tmpfs: Bad value for 'mpol' 01:39:52 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8a10}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000002c0)={'syztnl0\x00', &(0x7f00000003c0)={'ip_vti0\x00', 0x0, 0x7, 0x8000, 0x5d6, 0x690, {{0xb, 0x4, 0x3, 0x0, 0x2c, 0x64, 0x0, 0x98, 0x29, 0x0, @local, @loopback, {[@timestamp={0x44, 0x14, 0x43, 0x0, 0x7, [0x400, 0x3, 0x6, 0x7]}, @noop, @end]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000004c0)={'syztnl0\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x700, 0x40, 0x5, 0x42, {{0xc, 0x4, 0x0, 0x1, 0x30, 0x64, 0x0, 0x3f, 0x2f, 0x0, @multicast1, @rand_addr=0x64010102, {[@lsrr={0x83, 0x17, 0xdc, [@empty, @dev={0xac, 0x14, 0x14, 0x25}, @empty, @local, @empty]}, @ra={0x94, 0x4, 0x1}]}}}}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@private0}}, &(0x7f0000000600)=0xe4) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x1, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @private=0xa010100}]}}}, @IFLA_MASTER={0x8, 0x3, r6}]}, 0x40}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x1, 0x803, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @private=0xa010100}]}}}, @IFLA_MASTER={0x8, 0x3, r9}]}, 0x40}}, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000840)={&(0x7f0000000640)={0x1e0, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x4000}, 0x8040) open(0x0, 0x141042, 0x0) ioctl$VIDIOC_G_CTRL(0xffffffffffffffff, 0xc008561b, &(0x7f0000000380)={0x9f99800}) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x0, 0x0) 01:39:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB='\b', @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000000)=r1, 0x4) [ 240.053144][T10521] loop4: detected capacity change from 0 to 4 [ 240.102437][T10528] loop2: detected capacity change from 0 to 140 [ 240.113961][T10521] EXT4-fs (loop4): Test dummy encryption mode enabled 01:39:53 executing program 3: r0 = openat$ocfs2_control(0xffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 01:39:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 240.181288][T10529] device batadv0 entered promiscuous mode [ 240.200829][T10529] device vlan2 entered promiscuous mode [ 240.215991][T10521] EXT4-fs (loop4): bad geometry: block count 54 exceeds size of device (2 blocks) [ 240.225800][T10529] device batadv0 left promiscuous mode 01:39:53 executing program 5: bpf$BPF_PROG_TEST_RUN(0x22, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780), 0x0}, 0x48) 01:39:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 240.376763][T10546] loop2: detected capacity change from 0 to 140 [ 240.409537][T10540] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 01:39:53 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 240.424437][T10540] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 240.434702][T10540] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 01:39:53 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff37}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000000080)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff37}, 0x48) dup2(r1, r0) [ 240.524697][T10529] device batadv0 entered promiscuous mode [ 240.552240][T10529] device vlan2 entered promiscuous mode 01:39:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 01:39:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}], 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='compress-force=z']) [ 240.577336][T10529] device batadv0 left promiscuous mode [ 240.617384][T10561] loop4: detected capacity change from 0 to 4 [ 240.646795][T10561] EXT4-fs (loop4): Test dummy encryption mode enabled [ 240.668546][T10561] EXT4-fs (loop4): bad geometry: block count 54 exceeds size of device (2 blocks) [ 240.685823][T10567] loop2: detected capacity change from 0 to 140 [ 240.834428][T10576] loop5: detected capacity change from 0 to 256 01:39:53 executing program 1: r0 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x30a, &(0x7f00000001c0)={&(0x7f00000003c0)=@newlink={0x68, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2325}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x1a}}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r1}, @IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x68}}, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x1, 0x0, 0x0) 01:39:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:39:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 240.887429][T10576] BTRFS: device fsid f90cac8b-044b-4fa8-8bee-4b8d3da88dc2 devid 1 transid 7 /dev/loop5 scanned by syz-executor.5 (10576) 01:39:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb", 0x20, 0x7e0}], 0x0, &(0x7f0000010f60)) 01:39:53 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='btrfs\x00', 0x0, 0x0) [ 240.999662][T10576] BTRFS error (device loop5): superblock checksum mismatch [ 241.020198][T10576] BTRFS error (device loop5): open_ctree failed [ 241.037058][T10587] loop4: detected capacity change from 0 to 4 [ 241.063207][T10587] EXT4-fs (loop4): Test dummy encryption mode enabled [ 241.071458][T10587] EXT4-fs (loop4): bad geometry: block count 54 exceeds size of device (2 blocks) [ 241.096852][T10591] loop2: detected capacity change from 0 to 140 [ 241.105783][T10600] loop3: detected capacity change from 0 to 7 [ 241.131177][T10576] loop5: detected capacity change from 0 to 256 [ 241.177419][T10597] device batadv0 entered promiscuous mode [ 241.213396][T10600] EXT4-fs (loop3): couldn't mount as ext2 due to feature incompatibilities 01:39:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x0, 0x0, 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 241.225344][T10597] device vlan2 entered promiscuous mode 01:39:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 241.253279][T10597] device batadv0 left promiscuous mode [ 241.264191][T10576] BTRFS error (device loop5): superblock checksum mismatch [ 241.272176][T10600] loop3: detected capacity change from 0 to 7 [ 241.289881][T10600] EXT4-fs (loop3): couldn't mount as ext2 due to feature incompatibilities 01:39:54 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) open(&(0x7f0000002000)='./bus\x00', 0x181ec2, 0x0) [ 241.329359][T10576] BTRFS error (device loop5): open_ctree failed 01:39:54 executing program 0: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) mount(&(0x7f0000000240)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='btrfs\x00', 0x0, 0x0) 01:39:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x30, r1, 0xb29, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8, 0x3, r2}, @val={0xc}}}}, 0x30}}, 0x0) [ 241.406898][T10622] loop2: detected capacity change from 0 to 140 01:39:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x0, 0x0, 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:39:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 241.689493][T10638] loop2: detected capacity change from 0 to 140 01:39:54 executing program 0: request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x3, 0x4c00000000006800}, 0x0, 0x0) 01:39:54 executing program 5: r0 = socket(0x200000000000011, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'veth0_macvtap\x00', 0x0}) bind$packet(r2, &(0x7f0000000180)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=@RTM_NEWMDB={0x18, 0x55, 0x1, 0x0, 0x0, {0x7, r4}}, 0x18}}, 0x0) 01:39:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000010f60)) 01:39:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x0, 0x0, 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:39:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x3, 0x3, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40046607, &(0x7f0000000000)=0xaf4) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb], 0x100000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:39:54 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(r0, 0x8926, 0x0) 01:39:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x800, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x0, @in=@broadcast}}, 0xe4) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x5d7928e712) 01:39:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000010f60)) 01:39:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:39:54 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) 01:39:54 executing program 3: socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="840e00002c00270d0000000000000000f6ffffff", @ANYRES32=r1, @ANYBLOB="00000000000000000e0000000d0001006d61746368616c6c00000000500e02004c0e0200480e01000a0001007065646974000000340e0280200e0200000000000000000000000000000000000000000008"], 0xe84}}, 0x0) r2 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000200), 0x4924924924926d3, 0x0) [ 242.103345][T10662] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 01:39:55 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(r0, 0x80045440, 0x0) 01:39:55 executing program 5: symlink(&(0x7f00000000c0)='..', &(0x7f0000000080)='./file0\x00') rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') [ 242.307962][T10678] loop4: detected capacity change from 0 to 1024 01:39:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000010f60)) 01:39:55 executing program 3: syz_init_net_socket$ax25(0x3, 0x2, 0xcb) [ 242.366872][T10678] EXT4-fs (loop4): Test dummy encryption mode enabled [ 242.451649][T10678] EXT4-fs (loop4): unsupported descriptor size 0 01:39:55 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) mount$overlay(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000180)={[{@lowerdir={'lowerdir', 0x3d, './bus'}, 0x3a}], [], 0x2f}) 01:39:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:39:55 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x24, &(0x7f0000000240)=@broute={'broute\x00', 0x10, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x20000000], 0x0, 0x0, 0x0}, 0xe0) 01:39:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@mcast2, @in6=@local}}, {{@in=@empty}, 0x0, @in=@broadcast}}, 0xe4) 01:39:55 executing program 3: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000100)={{0x0, 0x0, 0x3}}) ppoll(&(0x7f0000000080), 0x2000000000000048, &(0x7f0000000180)={0x77359400}, &(0x7f0000000140), 0x8) 01:39:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}], 0x0, &(0x7f0000010f60)) [ 242.776246][T10699] loop4: detected capacity change from 0 to 1024 [ 242.849472][T10699] EXT4-fs (loop4): Test dummy encryption mode enabled 01:39:55 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r0, 0x40049409, 0x0) 01:39:55 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x800, 0x0, 0xff, 0x1}, 0x20) 01:39:55 executing program 5: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780), 0x0}, 0x48) [ 242.899272][T10711] loop2: detected capacity change from 0 to 7 [ 242.904986][T10699] EXT4-fs (loop4): unsupported descriptor size 0 [ 242.918198][T10711] EXT4-fs (loop2): bad geometry: block count 64 exceeds size of device (3 blocks) 01:39:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@ipv6_newaddr={0x40, 0x14, 0x121, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xffffffff}}, @IFA_LOCAL={0x14, 0x2, @loopback}]}, 0x40}}, 0x0) 01:39:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}], 0x0, &(0x7f0000010f60)) 01:39:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:39:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_LINK={0x8, 0x1, r2}, @IFLA_GRE_OFLAGS={0x6, 0x3, 0x3f}]}}}]}, 0x44}}, 0x0) 01:39:55 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(r0, 0x5422, 0x0) 01:39:55 executing program 3: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x38fe41, 0x0) fcntl$lock(r0, 0x2, 0x0) [ 243.149452][T10727] loop2: detected capacity change from 0 to 7 01:39:56 executing program 5: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x4, 0x0, &(0x7f0000000100)) [ 243.195177][T10727] EXT4-fs (loop2): bad geometry: block count 64 exceeds size of device (3 blocks) [ 243.246758][T10731] loop4: detected capacity change from 0 to 1024 01:39:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}], 0x0, &(0x7f0000010f60)) [ 243.338603][T10731] EXT4-fs (loop4): Test dummy encryption mode enabled [ 243.345969][T10731] EXT4-fs (loop4): unsupported descriptor size 0 [ 243.358078][T10742] batman_adv: Cannot find parent device 01:39:56 executing program 3: r0 = socket$inet6_sctp(0xa, 0x801, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x6c, 0x0, &(0x7f0000000100)) 01:39:56 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 01:39:56 executing program 5: syz_mount_image$hfsplus(&(0x7f00000001c0)='hfsplus\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001300)={[{@session={'session'}}]}) 01:39:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r1}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) [ 243.467721][T10750] loop2: detected capacity change from 0 to 7 01:39:56 executing program 3: r0 = openat$rdma_cm(0xffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000140)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 01:39:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 243.530470][T10750] EXT4-fs (loop2): bad geometry: block count 64 exceeds size of device (3 blocks) [ 243.531145][T10756] hfsplus: unable to find HFS+ superblock [ 243.564253][T10756] hfsplus: unable to find HFS+ superblock 01:39:56 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000140)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000140), &(0x7f0000000640)=0x8) 01:39:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:39:56 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5453, 0x0) [ 243.774254][T10775] loop4: detected capacity change from 0 to 1024 [ 243.812281][T10775] EXT4-fs (loop4): Test dummy encryption mode enabled [ 243.827364][T10775] EXT4-fs (loop4): unsupported descriptor size 0 01:39:56 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 01:39:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 243.912890][T10784] loop2: detected capacity change from 0 to 140 01:39:56 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1, 0x2}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:39:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) socket$xdp(0x2c, 0x3, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(0xffffffffffffffff, 0xc0285629, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x6) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x3c) [ 244.077799][T10784] EXT4-fs error (device loop2): ext4_fill_super:4942: inode #2: comm syz-executor.2: iget: root inode unallocated 01:39:56 executing program 0: mkdir(0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ptype\x00') preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000440)=""/65, 0x41}, {&(0x7f0000000240)=""/22, 0x16}, {&(0x7f0000000280)=""/194, 0xc2}, {&(0x7f00000004c0)=""/226, 0xe2}], 0x4, 0x100, 0x0) 01:39:56 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@loopback, 0x0, 0x0, 0xff, 0x9}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37) [ 244.169836][T10784] EXT4-fs (loop2): get root inode failed [ 244.177974][T10797] loop4: detected capacity change from 0 to 1024 [ 244.244152][T10784] EXT4-fs (loop2): mount failed 01:39:57 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1, 0x2}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 244.281809][T10797] EXT4-fs (loop4): Test dummy encryption mode enabled 01:39:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) 01:39:57 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@loopback, 0x0, 0x0, 0xff, 0x9}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37) [ 244.345332][T10797] EXT4-fs (loop4): unsupported descriptor size 0 01:39:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:39:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:39:57 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@loopback, 0x0, 0x0, 0xff, 0x9}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37) 01:39:57 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1, 0x2}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:39:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) [ 244.617723][T10819] loop2: detected capacity change from 0 to 140 [ 244.678320][T10821] loop4: detected capacity change from 0 to 1024 [ 244.700135][T10821] EXT4-fs (loop4): Test dummy encryption mode enabled [ 244.710706][T10819] EXT4-fs error (device loop2): ext4_fill_super:4942: inode #2: comm syz-executor.2: iget: root inode unallocated [ 244.774085][T10821] EXT4-fs (loop4): unsupported descriptor size 0 [ 244.808524][T10819] EXT4-fs (loop2): get root inode failed [ 244.814374][T10819] EXT4-fs (loop2): mount failed 01:39:57 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@loopback, 0x0, 0x0, 0xff, 0x9}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37) 01:39:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:39:57 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1, 0x2}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:39:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) 01:39:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {0x0, 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:39:57 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x200c0, 0x0) 01:39:57 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0xff, 0x1}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37) [ 245.138848][T10845] loop2: detected capacity change from 0 to 140 [ 245.150051][T10844] loop4: detected capacity change from 0 to 1024 [ 245.178523][T10844] EXT4-fs (loop4): Test dummy encryption mode enabled 01:39:58 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 245.185350][T10844] EXT4-fs (loop4): unsupported descriptor size 0 [ 245.192662][T10845] EXT4-fs error (device loop2): ext4_fill_super:4942: inode #2: comm syz-executor.2: iget: root inode unallocated 01:39:58 executing program 1: r0 = socket(0x10, 0x3, 0x0) connect$nfc_llcp(r0, &(0x7f0000002a40)={0x10, 0x0, 0x4, 0x0, 0x0, 0x0, "ba36ced9783d0f45ddce683daa7a326bfcc2fd835a70e50ae76adb66d09c17fa54dd8365b8cff2bf0b8680c387ad723115cb98d59ec8fd57f4e8f3f7650803"}, 0x58) 01:39:58 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37) [ 245.263119][T10845] EXT4-fs (loop2): get root inode failed 01:39:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:39:58 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) [ 245.325885][T10845] EXT4-fs (loop2): mount failed 01:39:58 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37) 01:39:58 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:39:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0), 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:39:58 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind(r0, 0x0, 0x0) [ 245.498368][T10871] loop4: detected capacity change from 0 to 1024 [ 245.528836][T10871] EXT4-fs (loop4): Test dummy encryption mode enabled [ 245.536086][T10871] EXT4-fs (loop4): unsupported descriptor size 0 01:39:58 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37) 01:39:58 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) shutdown(r0, 0x2) [ 245.637117][T10880] loop2: detected capacity change from 0 to 140 [ 245.675291][T10880] EXT4-fs error (device loop2): ext4_fill_super:4942: inode #2: comm syz-executor.2: iget: root inode unallocated 01:39:58 executing program 1: chdir(0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0xc0406618) 01:39:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 245.711870][T10880] EXT4-fs (loop2): get root inode failed 01:39:58 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 245.770671][T10880] EXT4-fs (loop2): mount failed [ 245.797480][T10892] loop4: detected capacity change from 0 to 1024 [ 245.814212][T10892] EXT4-fs (loop4): Test dummy encryption mode enabled 01:39:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0), 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:39:58 executing program 3: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0xff, 0x1}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37) [ 245.880216][T10892] EXT4-fs (loop4): unsupported descriptor size 0 01:39:58 executing program 5: r0 = socket(0x1d, 0x2, 0x6) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, 0x0, 0x2}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:39:58 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) shutdown(r0, 0x2) 01:39:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002800050ad25a802e8c63940d0424fc600c00184004ac0f000dac0f0037153e370a00038004000008d1bd", 0x33fe0}], 0x1}, 0x0) syz_open_dev$dri(0x0, 0x0, 0x8a201) [ 245.946197][T10902] loop2: detected capacity change from 0 to 140 01:39:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a", 0x10, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:39:58 executing program 3: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0xff, 0x1}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37) 01:39:58 executing program 3: setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0xff, 0x1}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37) [ 246.084541][T10902] EXT4-fs error (device loop2): ext4_fill_super:4942: inode #2: comm syz-executor.2: iget: root inode unallocated [ 246.097529][T10902] EXT4-fs (loop2): get root inode failed [ 246.104382][T10902] EXT4-fs (loop2): mount failed 01:39:58 executing program 5: r0 = socket(0x1d, 0x2, 0x6) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, 0x0, 0x2}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 246.194818][T10920] loop4: detected capacity change from 0 to 1024 [ 246.268701][T10920] EXT4-fs (loop4): Test dummy encryption mode enabled [ 246.317074][T10920] EXT4-fs (loop4): unsupported descriptor size 0 01:39:59 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0xff, 0x1}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37) 01:39:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) shutdown(r0, 0x2) 01:39:59 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) accept4(r0, 0x0, 0x0, 0x0) 01:39:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a", 0x10, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:39:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0), 0x0, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:39:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) 01:39:59 executing program 5: r0 = socket(0x1d, 0x2, 0x6) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, 0x0, 0x2}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:39:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11204}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 246.564567][T10936] loop2: detected capacity change from 0 to 140 [ 246.585172][T10943] loop4: detected capacity change from 0 to 1024 [ 246.630342][T10936] EXT4-fs error (device loop2): ext4_fill_super:4942: inode #2: comm syz-executor.2: iget: root inode unallocated [ 246.643024][T10936] EXT4-fs (loop2): get root inode failed [ 246.651930][T10936] EXT4-fs (loop2): mount failed [ 246.660751][T10943] EXT4-fs (loop4): Test dummy encryption mode enabled [ 246.694117][T10943] EXT4-fs (loop4): unsupported descriptor size 0 01:39:59 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0xff, 0x1}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37) 01:39:59 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000100)={0x1d, r0, 0x2}, 0x18) sendto$l2tp6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 01:39:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b", 0x1e, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:39:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a", 0x10, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:39:59 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5419, 0x0) 01:39:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) 01:39:59 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000100)={0x1d, r0, 0x2}, 0x18) sendto$l2tp6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 247.042759][T10968] loop2: detected capacity change from 0 to 140 01:39:59 executing program 3: r0 = socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0xff, 0x1}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37) 01:39:59 executing program 1: syz_mount_image$ocfs2(&(0x7f0000000000)='ocfs2\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x3b, &(0x7f0000000200)=[{&(0x7f0000010000)="02020202020202027468697320697320616e206f6366733220766f6c756d650002020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202027468697320697320616e206f6366733220766f6c756d6500020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202027468697320697320616e206f6366733220766f6c756d65000202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202027468697320697320616e206f6366733220766f6c756d65000202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202024f43465356320000469a6d08ffffffff000000000020000000000000000000000000000000000000000000003100000000000000000000009cc3655f000000009cc3655f00000000000000000000000002000000000000000000000000000000469a6d0800000000000000000000000000000000000000000000000000000000983cdfbab1020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005a000000140000000000000000009cc3655f00000000000000000300000050bf00000700000009000000000000000a000000000000000c0000000e0000000200000003dd2f0f0400"/8480, 0x2120}, {&(0x7f0000012200)="00000000000000000000000000000000e5253c7832f34943bddfa97f3dc0d2a20000000000000000000000000000000000000000000000000001000048d49dd37de6dae4618d7a4500"/96, 0x60, 0x2140}, {&(0x7f0000012300)="47524f5550303100c00f0020710e0000469a6d080000000000000000000000000f00000000000000040000000000000046f5fb16610c00000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f00"/640, 0x280, 0x4000}, {&(0x7f0000012600)="47524f5550303100c00f1001f6000000469a6d080000000000000000000000000c000000000000000800000000000000913d1ef7f40100000000000000000000ffffff0300"/96, 0x60, 0x8000}, {&(0x7f0000012700)="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", 0x100, 0x9000}, {&(0x7f0000012800)="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"/896, 0x380, 0xa000}, {&(0x7f0000012c00)="494e4f4445303100469a6d08ffff0300000000000000000000000000000000000000000000000000a4810100110000009cc3655f000000009cc3655f000000009cc3655f0000000000000000000000000b000000000000000000000000000000469a6d0800000000000000000000000000000000000000000000000000000000a8e54565cb01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f300"/224, 0xe0, 0xb000}, {&(0x7f0000012d00)="494e4f4445303100469a6d08ffff0400000000004400000000000000000000000000110000000000a4810100910400009cc3655f000000009cc3655f000000009cc3655f0000000000000000000000000c000000000000000000000000000000469a6d0800000000000000000000000000000000000000000000000000000000e1c789e71f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000001001000044000400f30001000000000000000000f6000000100100000800000000000000", 0xe0, 0xc000}, {&(0x7f0000012e00)="494e4f4445303100469a6d08ffff0500000000000100000000000000000000000040000000000000a4810100110000009cc3655f000000009cc3655f00000000b4c3655f0000000000000000000000000d000000000000000000000000000000469a6d080000000000000000000000000000000000000000000000000000000052a8533bf600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f30001000000000000000000000000000000010000001842000000000000", 0xe0, 0xd000}, {&(0x7f0000012f00)="494e4f4445303100469a6d08ffff0600000000004000000000000000000000000000100000000000a4810100110200009cc3655f000000009cc3655f000000009cc3655f0000000000000000000000000e000000000000000000000000000000469a6d0800000000000000000000000000000000000000000000000000000000b77557f05807000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f30001000000000000000000000000000000400000001801000000000000", 0xe0, 0xe000}, {&(0x7f0000013000)="494e4f4445303100469a6d08ffff0700000000000020000000000000000000000000000800000000a4810100910400009cc3655f000000009cc3655f000000009cc3655f0000000000000000000000000f000000000000000000000000000000469a6d080000000000000000000000000000000000000000000000000000000008f6d0ba5f0400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008f11000000200000007e0100f30001000000000000000000710e0000002000000400000000000000", 0xe0, 0xf000}, {&(0x7f0000013100)="494e4f4445303100469a6d08ffff0800000000000200000000000000000000000060000000000000a4810100111000009cc3655f000000009cc3655f00000000b5c3655f00000000000000000000000010000000000000000000000000000000469a6d080000000000000000000000000000000000000000000000000000000032fc918a4e03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f30002000000000000000000000000000000010000001c420000000000000100000001000000344200"/256, 0x100, 0x10000}, {&(0x7f0000013200)="494e4f4445303100469a6d08ffff0900000000000200000000000000000000000060000000000000a4810100111000009cc3655f000000009cc3655f00000000b6c3655f00000000000000000000000011000000000000000000000000000000469a6d080000000000000000000000000000000000000000000000000000000070f321ab7407000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f300020000000000000000000000000000000100000028420000000000000100000001000000384200"/256, 0x100, 0x11000}, {&(0x7f0000013300)="494e4f4445303100469a6d08ffff0a0000000000000000000000000000000000380f000000000000ed410200110000009cc3655f000000009cc3655f000000009cc3655f00000000000000000000000012000000000000000000000000000000469a6d0800000000000000000000000000000000000001000000000000000000bda254b8300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000380f0000000000001200000000000000100001022e0000000a00000000000000280f02022e2e00"/256, 0x100, 0x12000}, {&(0x7f0000013400)="494e4f4445303100469a6d08ffff0b0000000000000000000000000000000000380f000000000000ed410200110000009cc3655f000000009cc3655f000000009cc3655f00000000000000000000000013000000000000000000000000000000469a6d0800000000000000000000000000000000000001000000000000000000a6aa5abd8f0400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000380f0000000000001300000000000000100001022e0000000a00000000000000280f02022e2e00"/256, 0x100, 0x13000}, {&(0x7f0000013500)="494e4f4445303100469a6d08ffff0c00000000000000000000000000000000000000000000000000a4810100910400009cc3655f000000009cc3655f000000009cc3655f00000000000000000000000014000000000000000000000000000000469a6d080000000000000000000000000000000000000000000000000000000006635b654f030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010400f300"/224, 0xe0, 0x14000}, {&(0x7f0000013600)="494e4f4445303100469a6d08ffff0d00000000000000000000000000000000000000000000000000a4810100910400009cc3655f000000009cc3655f000000009cc3655f00000000000000000000000015000000000000000000000000000000469a6d0800000000000000000000000000000000000000000000000000000000372687e0bc010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010400f300"/224, 0xe0, 0x15000}, {&(0x7f0000013700)="494e4f4445303100469a6d08ffff0e00000000000001000000000000000000000000400000000000a4810100910400009cc3655f000000009cc3655f000000009cc3655f00000000000000000000000016000000000000000000000000000000469a6d08000000000000000000000000000000000000000000000000000000001d4748f318060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000004000000010400f30001000000000000000000fe030000000400003c42000000000000", 0xe0, 0x16000}, {&(0x7f0000013800)="494e4f4445303100469a6d08ffff0f00000000000000000000000000000000000000000000000000a4810100910400009cc3655f000000009cc3655f000000009cc3655f00000000000000000000000017000000000000000000000000000000469a6d080000000000000000000000000000000000000000000000000000000014aa4e3049030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010400f300"/224, 0xe0, 0x17000}, {&(0x7f0000013900)="494e4f4445303100469a6d08ffff1000000000000008000000000000000000000000000200000000a4810100110100009cc3655f000000009cc3655f00000000a3c3655f00000000000000000000000018000000000000000000000000000000469a6d0800000000000000000000000000000000000000000000000000000000fcea1a509105000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f30001000000000000000000000000000000000800001802000000000000", 0xe0, 0x18000}, {&(0x7f0000013a00)="494e4f4445303100469a6d08ffff1100000000000008000000000000000000000000000200000000a4810100110100009cc3655f000000009cc3655f00000000abc3655f00000000000000000000000019000000000000000000000000000000469a6d0800000000000000000000000000000000000000000000000000000000a3236346b503000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f30001000000000000000000000000000000000800001822000000000000", 0xe0, 0x19000}, {&(0x7f0000013b00)="494e4f4445303100469a6d08ffff1200000000000000000000000000000000000000000000000000a4810100d10000009cc3655f000000009cc3655f000000009cc3655f0000000000000000000000001a000000000000000000000000000000469a6d080000000000000000000000000000000000000000000000000000000023a16adbca010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300f00"/224, 0xe0, 0x1a000}, {&(0x7f0000013c00)="494e4f4445303100469a6d08ffff1300000000000000000000000000000000000000000000000000a4810100d10000009cc3655f000000009cc3655f000000009cc3655f0000000000000000000000001b000000000000000000000000000000469a6d080000000000000000000000000000000000000000000000000000000012e4b65e39030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300f00"/224, 0xe0, 0x1b000}, {&(0x7f0000013d00)="494e4f4445303100469a6d08ffff1400000000000000000000000000000000000000000000000000a4810100110800009cc3655f000000009cc3655f000000009cc3655f0000000000000000000000001c000000000000000000000000000000469a6d0800000000000000000000000000000000000000000000000000000000d30463d7b60600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e70100"/224, 0xe0, 0x1c000}, {&(0x7f0000013e00)="494e4f4445303100469a6d08ffff1500000000000000000000000000000000000000000000000000a4810100110800009cc3655f000000009cc3655f000000009cc3655f0000000000000000000000001d000000000000000000000000000000469a6d0800000000000000000000000000000000000000000000000000000000e241bf52450400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e70100"/224, 0xe0, 0x1d000}, {&(0x7f0000013f00)="494e4f4445303100469a6d08ffff1600000000000100000000000000000000000020000000000000a4810100111000009cc3655f000000009cc3655f00000000b5c3655f0000000000000000000000001e000000000000000000000000000000469a6d080000000000000000000000000000000000000000000000000000000049d397bfbf07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f30001000000000000000000000000000000010000002042000000000000", 0xe0, 0x1e000}, {&(0x7f0000014000)="494e4f4445303100469a6d08ffff1700000000000100000000000000000000000020000000000000a4810100111000009cc3655f000000009cc3655f00000000b5c3655f0000000000000000000000001f000000000000000000000000000000469a6d0800000000000000000000000000000000000000000000000000000000485f78cc8203000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f30001000000000000000000000000000000010000002442000000000000", 0xe0, 0x1f000}, {&(0x7f0000014100)="494e4f4445303100469a6d08ffff1800000000000100000000000000000000000020000000000000a4810100111000009cc3655f000000009cc3655f00000000b6c3655f00000000000000000000000020000000000000000000000000000000469a6d0800000000000000000000000000000000000000000000000000000000cdfeb4805105000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f30001000000000000000000000000000000010000002c42000000000000", 0xe0, 0x20000}, {&(0x7f0000014200)="494e4f4445303100469a6d08ffff1900000000000100000000000000000000000020000000000000a4810100111000009cc3655f000000009cc3655f00000000b8c3655f00000000000000000000000021000000000000000000000000000000469a6d08000000000000000000000000000000000000000000000000000000009f5b9abd7c03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f30001000000000000000000000000000000010000003042000000000000", 0xe0, 0x21000}, {&(0x7f0000014300)="c03b39980000000400000000000010000000200000000001000000010000000100000000000000000000000200000000e5253c7832f34943bddfa97f3dc0d2a20000000100"/96, 0x60, 0x218000}, {&(0x7f0000014400)="c03b39980000000400000000000010000000200000000001000000010000000100000000000000000000000200000000e5253c7832f34943bddfa97f3dc0d2a20000000100"/96, 0x60, 0x2218000}, {&(0x7f0000014500)="7024f50c00000000803a0900803a090010270000060000000000000005000000380f000000000000ed410300110000009cc3655f000000009cc3655f000000009cc3655f00000000000000000000000009000000000000000000000000000000469a6d0800000000000000000000000000000000000001000000000000000000fe9ca1cd090100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000380f0000000000000900000000000000100001022e0000000900000000000000280f02022e2e00"/256, 0x100, 0x421c000}, {&(0x7f0000014600)="00000000000000000000000000000000000000000000000055c30fe6b10100000200"/64, 0x40, 0x421cfe0}, {&(0x7f0000014700)="000000000000000000000000000000000000000000000000b6ad528d050000000300"/64, 0x40, 0x421dfe0}, {&(0x7f0000014800)="0000000000000000000000000000000000000000000000009a048ad7060000000400"/64, 0x40, 0x421efe0}, {&(0x7f0000014900)="0000000000000000000000000000000000000000000000001f5df08806000000c024f50c0000000001000000010000000200"/64, 0x40, 0x421ffe0}, {&(0x7f0000014a00)="00000000000000000000000000000000000000000000000090aefd31bc000000", 0x20, 0x4220fe0}, {&(0x7f0000014b00)="000000000000000000000000000000000000000000000000eeffe33800000000", 0x20, 0x4221fe0}, {&(0x7f0000014c00)="c024f50c0000000001000000010000000200"/32, 0x20, 0x4224000}, {&(0x7f0000014d00)="00000000000000000000000000000000000000000000000090aefd31bc000000", 0x20, 0x4224fe0}, {&(0x7f0000014e00)="000000000000000000000000000000000000000000000000eeffe33800000000", 0x20, 0x4225fe0}, {&(0x7f0000014f00)="7124f50c00000000803a0900803a0900102700000600000000000000050000000060000000000000a4810100111000009cc3655f000000009cc3655f00000000b5c3655f00000000000000000000000010000000000000000000000000000000469a6d080000000000000000000000000000000000000000000000000000000032fc918a4e03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f30002000000000000000000000000000000010000001c420000000000000100000001000000344200"/256, 0x100, 0x4228000}, {&(0x7f0000015000)="000000000000000000000000000000000000000000000000ffc17ede7b0700000200"/64, 0x40, 0x4228fe0}, {&(0x7f0000015100)="000000000000000000000000000000000000000000000000b6ad528d050000000300"/64, 0x40, 0x4229fe0}, {&(0x7f0000015200)="0000000000000000000000000000000000000000000000009a048ad7060000000400"/64, 0x40, 0x422afe0}, {&(0x7f0000015300)="0000000000000000000000000000000000000000000000001f5df08806000000c124f50c0000000001000000010000000200"/64, 0x40, 0x422bfe0}, {&(0x7f0000015400)="000000000000000000000000000000000000000000000000bc07256bbf000000", 0x20, 0x422cfe0}, {&(0x7f0000015500)="000000000000000000000000000000000000000000000000eeffe33800000000", 0x20, 0x422dfe0}, {&(0x7f0000015600)="c124f50c0000000001000000010000000200"/32, 0x20, 0x4230000}, {&(0x7f0000015700)="000000000000000000000000000000000000000000000000bc07256bbf000000", 0x20, 0x4230fe0}, {&(0x7f0000015800)="000000000000000000000000000000000000000000000000eeffe33800000000", 0x20, 0x4231fe0}, {&(0x7f0000015900)="0500"/32, 0x20, 0x4234000}, {&(0x7f0000015a00)="00000000000000000000000000000000000000000000000033f428d205000000000000000000000001000000000000000000000000000000000000000000000000000000000000000100"/96, 0x60, 0x4234fe0}, {&(0x7f0000015b00)="0000000000000000000000000000000000000000000000007375191502010000", 0x20, 0x4235fe0}, {&(0x7f0000015c00)="0500"/32, 0x20, 0x4238000}, {&(0x7f0000015d00)="00000000000000000000000000000000000000000000000033f428d205000000000000000000000001000000000000000000000000000000000000000000000000000000000000000100"/96, 0x60, 0x4238fe0}, {&(0x7f0000015e00)="0000000000000000000000000000000000000000000000007375191502010000", 0x20, 0x4239fe0}, {&(0x7f0000015f00)="47524f555030310000010004fe030000469a6d0800000000000000000000000016000000000000003c42000000000000f2f0803cf701000000000000000000000300"/96, 0x60, 0x423c000}, {&(0x7f0000016000)="494e4f4445303100469a6d080000010000000000000000000000000000000000380f000000000000ed41020001000000b9c3655f00000000b9c3655f00000000b9c3655f0000000000000000000000003d420000000000000000000000000000469a6d0800000000000000000000000000000000000001000000000000000000f4428b5fbb070000000000000000000000000000000000003c420000000000000000000000000000000000000000000000000000000000000000000000000000380f0000000000003d42000000000000100001022e0000000900000000000000280f02022e2e00"/256, 0x100, 0x423d000}], 0x0, &(0x7f0000016100)) [ 247.133686][T10968] EXT4-fs error (device loop2): ext4_fill_super:4942: inode #2: comm syz-executor.2: iget: root inode unallocated [ 247.160283][T10977] loop4: detected capacity change from 0 to 1024 01:40:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) [ 247.196979][T10968] EXT4-fs (loop2): get root inode failed [ 247.203101][T10968] EXT4-fs (loop2): mount failed [ 247.218563][T10977] EXT4-fs (loop4): Test dummy encryption mode enabled [ 247.339334][T10977] EXT4-fs (loop4): unsupported descriptor size 0 01:40:00 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000100)={0x1d, r0, 0x2}, 0x18) sendto$l2tp6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 01:40:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b", 0x1e, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:40:00 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0xff, 0x1}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37) 01:40:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c89", 0x18, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 247.488475][T10992] loop1: detected capacity change from 0 to 264192 01:40:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) [ 247.577253][T10992] (syz-executor.1,10992,1):ocfs2_parse_options:1479 ERROR: Invalid heartbeat mount options 01:40:00 executing program 5: r0 = socket(0x0, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1, 0x2}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 247.678379][T10992] (syz-executor.1,10992,1):ocfs2_fill_super:1188 ERROR: status = -22 [ 247.686894][T11001] loop2: detected capacity change from 0 to 140 [ 247.695680][T11005] loop4: detected capacity change from 0 to 1024 01:40:00 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0xff, 0x1}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37) [ 247.732304][T11001] EXT4-fs error (device loop2): ext4_fill_super:4942: inode #2: comm syz-executor.2: iget: root inode unallocated [ 247.756792][T11005] EXT4-fs (loop4): Test dummy encryption mode enabled [ 247.798724][T11005] EXT4-fs (loop4): unsupported descriptor size 0 [ 247.810357][T10992] loop1: detected capacity change from 0 to 264192 [ 247.825264][T10992] (syz-executor.1,10992,1):ocfs2_parse_options:1479 ERROR: Invalid heartbeat mount options [ 247.842680][T11001] EXT4-fs (loop2): get root inode failed [ 247.873203][T11001] EXT4-fs (loop2): mount failed 01:40:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) 01:40:00 executing program 5: r0 = socket(0x0, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1, 0x2}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:40:00 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c89", 0x18, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 247.895512][T10992] (syz-executor.1,10992,0):ocfs2_fill_super:1188 ERROR: status = -22 01:40:00 executing program 1: semctl$SETALL(0x0, 0x0, 0x13, &(0x7f0000000180)) 01:40:00 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0xff, 0x1}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37) 01:40:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b", 0x1e, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:40:00 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) 01:40:00 executing program 5: r0 = socket(0x0, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1, 0x2}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 248.102893][T11030] loop4: detected capacity change from 0 to 1024 [ 248.134109][T11030] EXT4-fs (loop4): Test dummy encryption mode enabled [ 248.144497][T11030] EXT4-fs (loop4): unsupported descriptor size 0 01:40:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c89", 0x18, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:01 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37) 01:40:01 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r0, 0xc0189436, 0x0) 01:40:01 executing program 0: bind$inet6(0xffffffffffffffff, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(0xffffffffffffffff, 0x2) [ 248.300661][T11047] loop2: detected capacity change from 0 to 140 01:40:01 executing program 5: r0 = socket(0x1d, 0x0, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1, 0x2}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:40:01 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x0, 0xfffffffffffffdb6, 0x3}, {0x0, [0x0]}}, &(0x7f0000000080)=""/142, 0x1b, 0x8e, 0x8}, 0x20) [ 248.403875][T11053] loop4: detected capacity change from 0 to 1024 [ 248.410837][T11047] EXT4-fs error (device loop2): ext4_fill_super:4942: inode #2: comm syz-executor.2: iget: root inode unallocated [ 248.436210][T11053] EXT4-fs (loop4): Test dummy encryption mode enabled 01:40:01 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37) [ 248.465829][T11053] EXT4-fs (loop4): unsupported descriptor size 0 [ 248.485206][T11047] EXT4-fs (loop2): get root inode failed [ 248.496560][T11047] EXT4-fs (loop2): mount failed 01:40:01 executing program 0: bind$inet6(0xffffffffffffffff, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(0xffffffffffffffff, 0x2) [ 248.583889][T11067] BPF:Invalid section offset [ 248.597033][T11068] BPF:Invalid section offset 01:40:01 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(r0, 0x5429, 0x0) 01:40:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f", 0x2d, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:40:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045", 0x1c, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:01 executing program 5: r0 = socket(0x1d, 0x0, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1, 0x2}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:40:01 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37) 01:40:01 executing program 0: bind$inet6(0xffffffffffffffff, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(0xffffffffffffffff, 0x2) [ 248.877750][T11078] loop4: detected capacity change from 0 to 1024 01:40:01 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045", 0x1c, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 248.944443][T11078] EXT4-fs (loop4): Test dummy encryption mode enabled [ 248.953371][T11078] EXT4-fs (loop4): unsupported descriptor size 0 [ 248.974766][T11085] loop2: detected capacity change from 0 to 140 01:40:01 executing program 5: r0 = socket(0x1d, 0x0, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1, 0x2}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 249.016037][T11085] EXT4-fs error (device loop2): ext4_fill_super:4942: inode #2: comm syz-executor.2: iget: root inode unallocated 01:40:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x3) sendto$inet6(r0, &(0x7f0000000000)="f2c03f9d3b82f67d6d29a13de382678de4b6873bec8ed6d9c919180276e04575d5246c8d86f4d98bc7ca918f213ed839d2ce93d0be3cb428fdd334bba258a73dc9cbb69b625f5a15af898aa4717ecb7e23ccdccc0408069df2db6640e7b5a0c22c2fb7d2c85d2359116d", 0x6a, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a, @rand_addr, 0x4a87}, 0x1c) 01:40:01 executing program 5: r0 = socket(0x1d, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1, 0x2}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:40:01 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) 01:40:01 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0x0, 0x1}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37) [ 249.118922][T11085] EXT4-fs (loop2): get root inode failed [ 249.168666][T11085] EXT4-fs (loop2): mount failed [ 249.243860][T11099] loop4: detected capacity change from 0 to 1024 [ 249.337774][T11099] EXT4-fs (loop4): Test dummy encryption mode enabled [ 249.391111][T11099] EXT4-fs (loop4): unsupported descriptor size 0 [ 249.398015][T11097] can: request_module (can-proto-0) failed. 01:40:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045", 0x1c, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f", 0x2d, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:40:02 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0x0, 0x1}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37) 01:40:02 executing program 1: r0 = socket(0x10, 0x800000000080002, 0x0) fchmod(r0, 0x0) 01:40:02 executing program 5: r0 = socket(0x1d, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1, 0x2}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:40:02 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) 01:40:02 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0x0, 0x1}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37) [ 249.670247][T11120] loop4: detected capacity change from 0 to 1024 [ 249.699562][T11120] EXT4-fs (loop4): Test dummy encryption mode enabled [ 249.745342][T11128] can: request_module (can-proto-0) failed. 01:40:02 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) [ 249.804165][T11136] loop2: detected capacity change from 0 to 140 [ 249.812586][T11120] EXT4-fs (loop4): unsupported descriptor size 0 01:40:02 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0xff}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37) 01:40:02 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) shutdown(r0, 0x0) [ 249.851321][T11136] EXT4-fs error (device loop2): ext4_fill_super:4942: inode #2: comm syz-executor.2: iget: root inode unallocated [ 249.885947][T11136] EXT4-fs (loop2): get root inode failed [ 249.894570][T11136] EXT4-fs (loop2): mount failed 01:40:02 executing program 5: r0 = socket(0x1d, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1, 0x2}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:40:02 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0xff}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37) 01:40:02 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f2800450100", 0x1e, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f", 0x2d, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:40:02 executing program 1: r0 = socket(0x40000000002, 0x3, 0x2) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00', r0) 01:40:02 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(0xffffffffffffffff, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) 01:40:02 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0xff}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37) [ 250.157077][T11154] can: request_module (can-proto-0) failed. [ 250.217960][T11160] loop4: detected capacity change from 0 to 1024 [ 250.248929][T11168] loop2: detected capacity change from 0 to 140 [ 250.249709][T11160] EXT4-fs (loop4): Test dummy encryption mode enabled 01:40:03 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1, 0x2}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 250.336391][T11168] EXT4-fs error (device loop2): ext4_fill_super:4942: inode #2: comm syz-executor.2: iget: root inode unallocated [ 250.403729][T11160] EXT4-fs (loop4): unsupported descriptor size 0 [ 250.412392][T11168] EXT4-fs (loop2): get root inode failed [ 250.418509][T11168] EXT4-fs (loop2): mount failed 01:40:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f", 0x34, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:40:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f2800450100", 0x1e, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:03 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0xff, 0x1}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37) 01:40:03 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) 01:40:03 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(0xffffffffffffffff, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) 01:40:03 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1, 0x2}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 250.633752][T11182] loop4: detected capacity change from 0 to 1024 [ 250.656744][T11182] EXT4-fs (loop4): Test dummy encryption mode enabled [ 250.672636][T11182] EXT4-fs (loop4): unsupported descriptor size 0 01:40:03 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0xff, 0x1}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37) [ 250.692722][T11187] loop2: detected capacity change from 0 to 140 [ 250.721093][T11187] EXT4-fs error (device loop2): ext4_fill_super:4942: inode #2: comm syz-executor.2: iget: root inode unallocated 01:40:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20a0, 0x0) [ 250.756397][T11187] EXT4-fs (loop2): get root inode failed [ 250.762365][T11187] EXT4-fs (loop2): mount failed 01:40:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f2800450100", 0x1e, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:03 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1, 0x2}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:40:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f", 0x34, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:40:03 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(0xffffffffffffffff, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) 01:40:03 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0xff, 0x1}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, &(0x7f00000004c0)=0x37) [ 251.035464][T11206] loop4: detected capacity change from 0 to 1024 [ 251.046568][T11206] EXT4-fs (loop4): Test dummy encryption mode enabled [ 251.054867][T11206] EXT4-fs (loop4): unsupported descriptor size 0 01:40:03 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:03 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, 0x0, 0x2}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:40:04 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) [ 251.193815][T11215] loop2: detected capacity change from 0 to 140 01:40:04 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, 0x0, 0x2}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:40:04 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0xff, 0x1}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, &(0x7f00000004c0)) [ 251.287421][T11223] loop4: detected capacity change from 0 to 1024 [ 251.298314][T11215] EXT4-fs error (device loop2): ext4_fill_super:4942: inode #2: comm syz-executor.2: iget: root inode unallocated [ 251.311353][T11215] EXT4-fs (loop2): get root inode failed [ 251.311885][T11223] EXT4-fs (loop4): Test dummy encryption mode enabled [ 251.317043][T11215] EXT4-fs (loop2): mount failed 01:40:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f", 0x34, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 251.465897][T11223] EXT4-fs (loop4): unsupported descriptor size 0 [ 251.529901][T11205] EXT4-fs (sda1): re-mounted. Opts: (null). Quota mode: none. 01:40:04 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_sock_diag(0x10, 0x3, 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000240)=[{&(0x7f0000000000)="4c0000001200ff09ff3a150099a283ff07b8008000f0ffff000000060040150024001d001fc411a0b598bc593ab6821148a730cc33a49868c62b2ca654a6613b6aab", 0x42}, {&(0x7f0000000440)="0baba02e95c8c0408265", 0xa}], 0x2}, 0x0) 01:40:04 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) 01:40:04 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0xff, 0x1}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, &(0x7f00000004c0)) 01:40:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 251.582527][T11205] EXT4-fs (sda1): re-mounted. Opts: (null). Quota mode: none. [ 251.592133][T11237] loop2: detected capacity change from 0 to 140 [ 251.615103][T11237] EXT4-fs error (device loop2): ext4_fill_super:4942: inode #2: comm syz-executor.2: iget: root inode unallocated 01:40:04 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, 0x0, 0x2}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 251.672462][T11237] EXT4-fs (loop2): get root inode failed [ 251.683878][T11237] EXT4-fs (loop2): mount failed 01:40:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000", 0x38, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 251.828423][T11248] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 251.836923][T11248] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 01:40:04 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0xff, 0x1}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, 0x0, &(0x7f00000004c0)) [ 251.903665][T11248] netlink: 'syz-executor.1': attribute type 29 has an invalid length. [ 251.952751][T11253] loop4: detected capacity change from 0 to 1024 [ 251.965825][T11248] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 01:40:04 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) [ 252.023473][T11253] EXT4-fs (loop4): Test dummy encryption mode enabled [ 252.032742][T11253] EXT4-fs (loop4): unsupported descriptor size 0 01:40:04 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000100)={0x1d, r1, 0x2}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 252.085543][T11260] loop2: detected capacity change from 0 to 140 01:40:04 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 252.145769][T11260] EXT4-fs error (device loop2): ext4_fill_super:4942: inode #2: comm syz-executor.2: iget: root inode unallocated [ 252.181477][T11260] EXT4-fs (loop2): get root inode failed 01:40:04 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0xff, 0x1}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, 0x0) 01:40:05 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_sock_diag(0x10, 0x3, 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000140)='fuse\x00', 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000240)=[{&(0x7f0000000000)="4c0000001200ff09ff3a150099a283ff07b8008000f0ffff000000060040150024001d001fc411a0b598bc593ab6821148a730cc33a49868c62b2ca654a6613b6aab", 0x42}, {&(0x7f0000000440)="0baba02e95c8c0408265", 0xa}], 0x2}, 0x0) [ 252.266833][T11260] EXT4-fs (loop2): mount failed 01:40:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) [ 252.441357][T11277] loop4: detected capacity change from 0 to 1024 [ 252.456811][T11279] netlink: 'syz-executor.1': attribute type 29 has an invalid length. 01:40:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) 01:40:05 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000100)={0x1d, r1, 0x2}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:40:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000", 0x38, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 252.517446][T11277] EXT4-fs (loop4): Test dummy encryption mode enabled [ 252.524683][T11277] EXT4-fs (loop4): unsupported descriptor size 0 01:40:05 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0xff, 0x1}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, 0x0) [ 252.565033][T11279] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 252.665654][T11279] netlink: 'syz-executor.1': attribute type 29 has an invalid length. 01:40:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 252.707172][T11279] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 01:40:05 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x0, 0x0, 0xff, 0x1}, 0x20) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local={0xfe, 0x80, [0xa4ffffff]}}, 0x0) [ 252.847225][T11293] loop2: detected capacity change from 0 to 140 [ 252.848460][T11295] loop4: detected capacity change from 0 to 1024 [ 252.881301][T11295] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 01:40:05 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000100)={0x1d, r1, 0x2}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:40:05 executing program 1: bind$netlink(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000080)=0x80000001, 0x4) unshare(0x6c060000) 01:40:05 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) [ 252.915047][T11293] EXT4-fs error (device loop2): ext4_fill_super:4942: inode #2: comm syz-executor.2: iget: root inode unallocated 01:40:05 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 252.990525][T11293] EXT4-fs (loop2): get root inode failed [ 253.024632][T11293] EXT4-fs (loop2): mount failed 01:40:05 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) bind$can_j1939(r0, 0x0, 0x0) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:40:05 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000100), 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000140)=0x9, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[], 0x2bcf) shutdown(r0, 0x1) 01:40:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) [ 253.180778][T11310] IPVS: ftp: loaded support on port[0] = 21 01:40:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000", 0x38, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 253.264147][T11314] loop4: detected capacity change from 0 to 1024 [ 253.274413][T11314] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 01:40:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) 01:40:06 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ftruncate(r1, 0x1c) fcntl$setstatus(r0, 0x4, 0x6100) write$FUSE_NOTIFY_STORE(r0, 0x0, 0x87ffffc) r2 = open(&(0x7f0000000380)='./bus\x00', 0x17e, 0x0) sendfile(r2, r2, 0x0, 0x8080fffffffe) ftruncate(0xffffffffffffffff, 0x0) 01:40:06 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) bind$can_j1939(r0, 0x0, 0x0) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 253.442830][T11343] loop2: detected capacity change from 0 to 140 [ 253.544366][T11354] loop4: detected capacity change from 0 to 1024 [ 253.554392][T11343] EXT4-fs error (device loop2): ext4_fill_super:4942: inode #2: comm syz-executor.2: iget: root inode unallocated [ 253.563350][T11354] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 253.578087][T11343] EXT4-fs (loop2): get root inode failed [ 253.582717][T11350] IPVS: ftp: loaded support on port[0] = 21 [ 253.585597][T11343] EXT4-fs (loop2): mount failed 01:40:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:06 executing program 1: syz_mount_image$jfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0) 01:40:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) 01:40:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000", 0x3a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:40:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x48, 0x18, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x1c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x2, 0x0, 0x1, [{0x14, 0x1, 'veth0_macvtap\x00'}]}]}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x1}]}], {0x14, 0x10}}, 0xd0}}, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={0x0, 0x1f}, &(0x7f0000000280)=0x8) socket$alg(0x26, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f00000002c0)={r2, 0x4}, 0x8) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="fb", 0x1) syz_usb_connect$uac1(0x4, 0x96, &(0x7f0000000000)=ANY=[], 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') read$qrtrtun(r3, &(0x7f0000000180)=""/154, 0x9a) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) [ 253.839948][T11389] loop4: detected capacity change from 0 to 1024 [ 253.856675][T11389] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 01:40:06 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 253.956612][T11400] loop2: detected capacity change from 0 to 140 [ 254.011520][T11405] netlink: 'syz-executor.3': attribute type 2 has an invalid length. [ 254.020878][T11400] EXT4-fs error (device loop2): ext4_fill_super:4942: inode #2: comm syz-executor.2: iget: root inode unallocated [ 254.020999][T11400] EXT4-fs (loop2): get root inode failed [ 254.021016][T11400] EXT4-fs (loop2): mount failed 01:40:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000", 0x3a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:40:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) [ 254.167957][T11416] loop4: detected capacity change from 0 to 1024 [ 254.189031][T11416] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 01:40:07 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0xa) bind(r0, &(0x7f0000000500)=@l2tp={0x2, 0x0, @private}, 0x80) 01:40:07 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 254.335938][T11428] loop2: detected capacity change from 0 to 140 [ 254.369078][T11428] EXT4-fs error (device loop2): ext4_fill_super:4942: inode #2: comm syz-executor.2: iget: root inode unallocated [ 254.403683][T11428] EXT4-fs (loop2): get root inode failed [ 254.409680][T11428] EXT4-fs (loop2): mount failed [ 254.416947][T11435] loop4: detected capacity change from 0 to 1024 01:40:07 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) [ 254.458856][T11435] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 255.468688][ T3254] ieee802154 phy0 wpan0: encryption failed: -22 [ 255.475049][ T3254] ieee802154 phy1 wpan1: encryption failed: -22 01:40:10 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) bind$can_j1939(r0, 0x0, 0x0) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:40:10 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r1 = dup(r0) getsockname$packet(r1, 0x0, &(0x7f0000000080)) 01:40:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f000000000000", 0x3a, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:40:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:10 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) 01:40:10 executing program 3: r0 = openat$sequencer(0xffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) poll(&(0x7f0000000200)=[{r0}], 0x1, 0x0) [ 257.856389][T11454] loop2: detected capacity change from 0 to 140 01:40:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 257.916383][T11459] loop4: detected capacity change from 0 to 1024 [ 257.924943][T11454] EXT4-fs error (device loop2): ext4_fill_super:4942: inode #2: comm syz-executor.2: iget: root inode unallocated 01:40:10 executing program 1: r0 = openat$mice(0xffffff9c, &(0x7f0000000040)='/dev/input/mice\x00', 0x3e01) write$vhost_msg_v2(r0, 0x0, 0x15) 01:40:10 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) [ 257.966606][T11454] EXT4-fs (loop2): get root inode failed [ 257.972396][T11454] EXT4-fs (loop2): mount failed [ 257.985339][T11459] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 01:40:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b}], 0x0, &(0x7f0000010f60)) 01:40:10 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x8782559fc2aff2e2, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f03002800050ad25a802e8c63940d0424fc600c00184004ac0f000dac0f0037153e370a00038004000008d1bd", 0x33fe0}], 0x1}, 0x0) r1 = openat$full(0xffffff9c, &(0x7f0000002240)='/dev/full\x00', 0x102, 0x0) perf_event_open(&(0x7f00000021c0)={0x5, 0x70, 0x0, 0x3f, 0x2, 0xf8, 0x0, 0xe182, 0x1040, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffff8, 0x0, @perf_bp={&(0x7f0000002180), 0x6}, 0x9808, 0x2, 0x9, 0x7, 0x2, 0xffffffff, 0xf800}, 0xffffffffffffffff, 0x0, r1, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r2) openat$full(0xffffff9c, &(0x7f00000014c0)='/dev/full\x00', 0x400000, 0x0) [ 258.151258][T11474] loop3: detected capacity change from 0 to 1024 [ 258.229231][T11474] EXT4-fs (loop3): Test dummy encryption mode enabled [ 258.257831][T11474] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 258.278607][T11480] loop4: detected capacity change from 0 to 1024 [ 258.286441][T11482] loop2: detected capacity change from 0 to 7 [ 258.312127][T11480] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 258.329143][T11482] EXT4-fs (loop2): bad geometry: block count 64 exceeds size of device (3 blocks) [ 258.346197][T11474] EXT4-fs (loop3): orphan cleanup on readonly fs [ 258.358304][T11474] EXT4-fs error (device loop3): ext4_orphan_get:1412: comm syz-executor.3: bad orphan inode 33554432 [ 258.370367][T11474] EXT4-fs (loop3): mounted filesystem without journal. Opts: test_dummy_encryption,errors=continue. Quota mode: writeback. 01:40:14 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, 0x0, 0x2}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:40:14 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) 01:40:14 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x148100, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x1) dup2(r2, r3) 01:40:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b}], 0x0, &(0x7f0000010f60)) [ 261.617829][T11509] loop4: detected capacity change from 0 to 1024 [ 261.624497][T11510] loop2: detected capacity change from 0 to 7 [ 261.625587][T11511] loop3: detected capacity change from 0 to 1024 [ 261.641075][T11511] EXT4-fs (loop3): Test dummy encryption mode enabled [ 261.653092][T11511] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 261.701566][T11509] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 261.713265][T11510] EXT4-fs (loop2): bad geometry: block count 64 exceeds size of device (3 blocks) [ 261.726551][T11511] EXT4-fs (loop3): orphan cleanup on readonly fs [ 261.732918][T11511] EXT4-fs error (device loop3): ext4_orphan_get:1412: comm syz-executor.3: bad orphan inode 33554432 01:40:14 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, 0x0, 0x2}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 261.755273][T11511] EXT4-fs (loop3): mounted filesystem without journal. Opts: test_dummy_encryption,errors=continue. Quota mode: writeback. 01:40:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:14 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) 01:40:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b}], 0x0, &(0x7f0000010f60)) 01:40:14 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00'}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, 0x0, 0x2}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:40:14 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) [ 262.040244][T11533] loop4: detected capacity change from 0 to 1024 [ 262.050773][T11535] loop3: detected capacity change from 0 to 1024 [ 262.082367][T11538] loop2: detected capacity change from 0 to 7 [ 262.088580][T11533] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 262.097912][T11535] EXT4-fs (loop3): Test dummy encryption mode enabled 01:40:14 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 262.148382][T11538] EXT4-fs (loop2): bad geometry: block count 64 exceeds size of device (3 blocks) [ 262.156059][T11535] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 262.194430][T11535] EXT4-fs (loop3): orphan cleanup on readonly fs [ 262.201225][T11535] EXT4-fs error (device loop3): ext4_orphan_get:1412: comm syz-executor.3: bad orphan inode 33554432 [ 262.213270][T11535] EXT4-fs (loop3): mounted filesystem without journal. Opts: test_dummy_encryption,errors=continue. Quota mode: writeback. 01:40:15 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x148100, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x1) dup2(r2, r3) 01:40:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:40:15 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) 01:40:15 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:40:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 263.030141][T11568] loop4: detected capacity change from 0 to 1024 [ 263.062084][T11572] loop3: detected capacity change from 0 to 1024 [ 263.071080][T11573] loop2: detected capacity change from 0 to 140 [ 263.081138][T11568] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 01:40:15 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) [ 263.133054][T11572] EXT4-fs (loop3): Test dummy encryption mode enabled [ 263.179182][T11573] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 263.188573][T11572] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 01:40:16 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1}, 0x18) sendto$l2tp6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:40:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 263.239914][T11572] EXT4-fs (loop3): orphan cleanup on readonly fs 01:40:16 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) [ 263.302281][T11572] EXT4-fs error (device loop3): ext4_orphan_get:1412: comm syz-executor.3: bad orphan inode 33554432 01:40:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 263.382172][T11572] EXT4-fs (loop3): mounted filesystem without journal. Opts: test_dummy_encryption,errors=continue. Quota mode: writeback. 01:40:16 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 263.542857][T11593] loop4: detected capacity change from 0 to 1024 [ 263.589075][T11593] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 263.597660][T11598] loop2: detected capacity change from 0 to 140 [ 263.609683][T11598] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 263.661931][T11604] loop3: detected capacity change from 0 to 1024 01:40:16 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) 01:40:16 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) r2 = openat$ttyS3(0xffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) poll(&(0x7f00000000c0)=[{}, {r2}], 0x2, 0x5) 01:40:16 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1, 0x2}, 0x18) sendto$l2tp6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 01:40:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:40:16 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 264.039093][T11618] loop3: detected capacity change from 0 to 1024 [ 264.054282][T11622] loop4: detected capacity change from 0 to 1024 [ 264.067341][T11621] loop2: detected capacity change from 0 to 140 [ 264.067937][T11622] EXT4-fs (loop4): invalid first ino: 0 01:40:16 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1, 0x2}, 0x18) sendto$l2tp6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 264.089029][T11621] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 01:40:16 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:16 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) 01:40:16 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:17 executing program 5: r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1, 0x2}, 0x18) sendto$l2tp6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 01:40:17 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) 01:40:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {0x0, 0x0, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 264.343897][T11644] loop4: detected capacity change from 0 to 1024 [ 264.393198][T11647] loop3: detected capacity change from 0 to 1024 [ 264.412182][T11644] EXT4-fs (loop4): invalid first ino: 0 [ 264.414875][T11651] loop2: detected capacity change from 0 to 140 [ 264.430143][T11651] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 01:40:17 executing program 1: syz_mount_image$omfs(&(0x7f0000000040)='omfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x90424, &(0x7f0000001380)) 01:40:17 executing program 5: mbind(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x0, 0x0, 0x0) 01:40:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:17 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) 01:40:17 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {0x0, 0x0, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 265.234381][T11673] loop4: detected capacity change from 0 to 1024 [ 265.259825][T11676] loop2: detected capacity change from 0 to 140 [ 265.272312][T11676] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 01:40:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x3) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) [ 265.300769][T11673] EXT4-fs (loop4): invalid first ino: 0 [ 265.307487][T11677] loop3: detected capacity change from 0 to 1024 01:40:18 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) 01:40:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {0x0, 0x0, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:40:18 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x1, 0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)={0x48, 0xd, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5}]}, 0x48}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00', 0xffffffffffffffff) sendmsg$FOU_CMD_DEL(r1, &(0x7f00000003c0)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x30, 0x0, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x3a}]}, 0x30}, 0x1, 0x0, 0x0, 0x24000010}, 0x8001) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="5c0000001000010400000000000be56366020000", @ANYRES32=0x0, @ANYBLOB="03c50000000000002c00128009000100766c616e000000001c00028006000100000000000c0002001c0000001b0000000400038008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 01:40:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:18 executing program 5: bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000008c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780), 0x0}, 0x48) 01:40:18 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, 0x0, 0x0) shutdown(r0, 0x2) 01:40:18 executing program 1: clock_gettime(0x0, 0x0) ppoll(&(0x7f0000000140), 0x0, &(0x7f0000000180)={0x77359400}, 0x0, 0x0) openat$mice(0xffffff9c, 0x0, 0x0) r0 = io_uring_setup(0x603d, &(0x7f00000002c0)={0x0, 0x0, 0x1, 0x0, 0x5d}) io_uring_setup(0x5eca, &(0x7f0000000d00)={0x0, 0xd6e7, 0x22, 0x0, 0x0, 0x0, r0}) [ 265.672422][T11701] loop2: detected capacity change from 0 to 140 [ 265.689127][T11703] loop3: detected capacity change from 0 to 1024 01:40:18 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, 0x0, 0x0) shutdown(r0, 0x2) 01:40:18 executing program 5: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x2, 0x2812, r0, 0x0) r1 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x2812, r1, 0x1000) perf_event_open(&(0x7f0000000280)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:40:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 265.731058][T11701] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 265.753440][T11709] loop4: detected capacity change from 0 to 1024 [ 265.797784][T11709] EXT4-fs (loop4): Test dummy encryption mode enabled [ 265.879671][T11709] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 01:40:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 265.952766][T11723] loop3: detected capacity change from 0 to 1024 [ 265.956461][ T36] audit: type=1804 audit(1614822018.722:11): pid=11722 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir998728148/syzkaller.MgfceJ/80/bus" dev="sda1" ino=14240 res=1 errno=0 [ 266.021043][ T36] audit: type=1804 audit(1614822018.782:12): pid=11722 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir998728148/syzkaller.MgfceJ/80/bus" dev="sda1" ino=14240 res=1 errno=0 01:40:18 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 266.049546][ T36] audit: type=1804 audit(1614822018.792:13): pid=11728 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir998728148/syzkaller.MgfceJ/80/bus" dev="sda1" ino=14240 res=1 errno=0 01:40:18 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, 0x0, 0x0) shutdown(r0, 0x2) 01:40:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:18 executing program 5: r0 = openat$rfkill(0xffffff9c, &(0x7f00000046c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, 0x0) [ 266.174138][T11732] loop2: detected capacity change from 0 to 140 [ 266.198288][T11732] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 266.218312][T11736] loop4: detected capacity change from 0 to 1024 [ 266.225751][T11740] loop3: detected capacity change from 0 to 21 [ 266.229357][T11736] EXT4-fs (loop4): Test dummy encryption mode enabled [ 266.242362][T11736] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 266.253196][T11740] EXT4-fs (loop3): Test dummy encryption mode enabled 01:40:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 266.295063][T11740] EXT4-fs (loop3): bad geometry: block count 54 exceeds size of device (10 blocks) 01:40:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:19 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) [ 266.463313][T11752] loop2: detected capacity change from 0 to 140 [ 266.500632][T11752] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 266.532205][T11759] loop4: detected capacity change from 0 to 1024 [ 266.556920][T11759] EXT4-fs (loop4): Test dummy encryption mode enabled [ 266.573336][T11759] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 01:40:19 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x40047459, 0x0) 01:40:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:19 executing program 1: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="400000001e00210100000000000000000a"], 0x40}}, 0x0) 01:40:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100), 0x0, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:40:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:19 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) [ 266.781110][T11773] loop3: detected capacity change from 0 to 21 [ 266.824179][T11781] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. [ 266.832118][T11777] loop2: detected capacity change from 0 to 140 [ 266.846282][T11773] EXT4-fs (loop3): Test dummy encryption mode enabled 01:40:19 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) 01:40:19 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb0100180000000005"], &(0x7f0000000400)=""/178, 0x34, 0xb2, 0x1}, 0x20) [ 266.872075][T11773] EXT4-fs (loop3): bad geometry: block count 54 exceeds size of device (10 blocks) [ 266.892349][T11777] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 266.904605][T11783] loop4: detected capacity change from 0 to 1024 01:40:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb01001800000000000000180000001c"], &(0x7f0000000400)=""/178, 0x34, 0xb2, 0x1}, 0x20) 01:40:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b00", 0x2e, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:40:19 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x2, 0x3, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x4}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 266.967965][T11783] EXT4-fs (loop4): Test dummy encryption mode enabled 01:40:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:19 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0xe, 0x3, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x70}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 267.037244][T11783] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 01:40:19 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x4, 0x3, &(0x7f0000000140)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 01:40:19 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(0xffffffffffffffff, 0x2) [ 267.144756][T11801] loop2: detected capacity change from 0 to 140 [ 267.153952][T11799] loop3: detected capacity change from 0 to 21 [ 267.169703][T11799] EXT4-fs (loop3): Test dummy encryption mode enabled [ 267.183214][T11801] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (30264!=0) 01:40:19 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 267.196580][T11799] EXT4-fs (loop3): bad geometry: block count 54 exceeds size of device (10 blocks) [ 267.221725][T11801] EXT4-fs (loop2): group descriptors corrupted! 01:40:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) write$vhost_msg_v2(r1, 0x0, 0xfffffea0) 01:40:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x0, 0x0, 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b00", 0x2e, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:40:20 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x8, 0x3, &(0x7f0000000140)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 267.371105][T11816] loop4: detected capacity change from 0 to 1024 [ 267.393653][T11816] EXT4-fs (loop4): Test dummy encryption mode enabled [ 267.407801][T11816] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 267.456320][T11824] loop2: detected capacity change from 0 to 140 [ 267.478484][T11824] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (30264!=0) 01:40:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x0, 0x0, 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 267.506661][T11824] EXT4-fs (loop2): group descriptors corrupted! 01:40:20 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x2, 0x3, &(0x7f0000000140)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x73], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 01:40:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b00", 0x2e, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:40:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb020018"], &(0x7f0000000400)=""/178, 0x34, 0xb2, 0x1}, 0x20) [ 267.642080][T11836] loop4: detected capacity change from 0 to 1024 01:40:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x0, 0x0, 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 267.721527][T11836] EXT4-fs (loop4): Test dummy encryption mode enabled [ 267.747833][T11836] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 267.761010][T11843] loop2: detected capacity change from 0 to 140 [ 267.788565][T11843] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (30264!=0) [ 267.858428][T11843] EXT4-fs (loop2): group descriptors corrupted! 01:40:20 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(0xffffffffffffffff, 0x2) 01:40:20 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x101}, 0x0, 0x0, 0x400ca, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/time\x00') r1 = gettid() r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000200), 0x10) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x2, 0x4, 0x86, 0x0, 0x1ff, 0xc0020, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080)}, 0x1, 0x0, 0x1, 0x0, 0x6940, 0x0, 0x40}, r1, 0x8, r2, 0x8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) openat$cgroup(r3, 0x0, 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.weight\x00', 0x2, 0x0) socket$kcm(0xa, 0x0, 0x11) sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2121) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc020662a, &(0x7f0000000000)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) 01:40:20 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:20 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x16, 0x3, &(0x7f0000000140)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 01:40:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c0000000000", 0x45, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:40:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 268.189602][T11861] loop2: detected capacity change from 0 to 140 [ 268.202109][T11861] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (41408!=39978) [ 268.213711][T11861] EXT4-fs (loop2): group descriptors corrupted! [ 268.243009][T11866] loop4: detected capacity change from 0 to 1024 [ 268.251458][T11867] loop3: detected capacity change from 0 to 1024 [ 268.267209][T11866] EXT4-fs (loop4): Test dummy encryption mode enabled [ 268.276409][T11867] EXT4-fs (loop3): Test dummy encryption mode enabled [ 268.283908][T11866] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) 01:40:21 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0xe, 0x3, &(0x7f0000000140)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 268.295038][T11867] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 268.325301][T11867] EXT4-fs error (device loop3): ext4_fill_super:4942: inode #2: comm syz-executor.3: iget: root inode unallocated 01:40:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c0000000000", 0x45, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 268.386049][T11867] EXT4-fs (loop3): get root inode failed [ 268.391815][T11867] EXT4-fs (loop3): mount failed 01:40:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:21 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)='/\x93posix_acl_access\x00') sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000002c0)="d56bd4fd70703a", 0x7}], 0x1}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000d00)=ANY=[@ANYBLOB="b70200000d000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b700000000000000950000000000000056ce36b68b0f334d6c37d03057c90000866f55e3376e4a82071d7827af04f8426e5b0eb4642172797fc01200533324f871d94768e23f51d3162c1bde856ed69b673e5b8d861ff207c0eb4b60a82fc3c0e2085d6add5893b223f703b454af0805f231eb8474953f640e3d490cdc0448ecf21b205768e34ab95b6ef820398c1ba4b81cee61a98ddb42e9abb9bd084623ca56c82b205eca4d90628aeacba98e160cf1ace06b8bb8fc0fb89f8abf8e94d4423fed46043df408851b9449cd85af76d9929b318c989bebd2f992112024650892c2e25b38f9cac8fea1a8c4712b53306c00a649a62720cd661d21ab5d7a8b9f974b4f5da4862c01b4cbe5f279fe779d5f9f366ec0aee3344d712d35edc17c209296c3db7ff279c9bc5ab356c3471399f860fef75f37888d0b0968f5a8fcdf5fcc5c62f45fcab1a3401d604f415840873a0e1df38c8c7c9ce232542acf57c44f9fa190b98de36aa113dba42def9c5ba7c90823529860583d8fb2dd17279eafcbdb226c00545f7f7c4fa93603f2ae2260bb56cb1a542ab27dfb25f54b6f73e2da29ef6b6f33e099cd949872daf9d6d0ab431a5838b5b09ab1b377fc08135572dd7e7ae09d603115f1cde757c9d2fd838a84251c957c8e9e62fee4d1554fa20d84df5e107d368cf89a5c17e916a990422a72150235ea93abb04521db134a00000000000000000e22c26a6ef512cd5c598330e07b18183e20f145c031a129aed2186d7a6e3cc00125abaf55b18a727bfc6616d0df05a684730e2f01c4c285a8ff7f00000000000000007d468676e6c0da27c75254f16c0680519c26f1a602b0df27df003c55c21296e16af8ac465612353a1e4fc13dfb1b20c6651f995f00e74ee6617789bd46f0ef55909f99474f12895d8eb9ba1fca1c7a1742efc538741e1944800e3241efc3693f7ee01eed94f1414dddca2a498e3e111b93fe36d84ff93b662354d172c35dbc90071de9a1d8519bde5175c72adc"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffcca}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000cc0)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b707030000009e4ef086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 01:40:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:21 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x101}, 0x0, 0x0, 0x400ca, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/time\x00') r1 = gettid() r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000200), 0x10) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x2, 0x4, 0x86, 0x0, 0x1ff, 0xc0020, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080)}, 0x1, 0x0, 0x1, 0x0, 0x6940, 0x0, 0x40}, r1, 0x8, r2, 0x8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) openat$cgroup(r3, 0x0, 0x200002, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.weight\x00', 0x2, 0x0) socket$kcm(0xa, 0x0, 0x11) sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2121) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc020662a, &(0x7f0000000000)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000002c0), 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) [ 268.591113][T11891] loop2: detected capacity change from 0 to 140 [ 268.628377][T11895] loop4: detected capacity change from 0 to 1024 [ 268.639405][T11895] EXT4-fs (loop4): Test dummy encryption mode enabled [ 268.640275][T11891] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (41408!=39978) [ 268.646443][T11895] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 268.674655][T11891] EXT4-fs (loop2): group descriptors corrupted! [ 268.681205][T11900] loop3: detected capacity change from 0 to 1024 [ 268.693190][T11900] EXT4-fs (loop3): Test dummy encryption mode enabled [ 268.700736][T11900] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 268.743080][T11900] EXT4-fs error (device loop3): ext4_fill_super:4942: inode #2: comm syz-executor.3: iget: root inode unallocated [ 268.755881][T11900] EXT4-fs (loop3): get root inode failed [ 268.762208][T11900] EXT4-fs (loop3): mount failed 01:40:21 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(0xffffffffffffffff, 0x2) 01:40:21 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x7, 0x4, 0x40000, 0x4000}, 0x40) 01:40:21 executing program 5: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000280)='/\x93posix_acl_access\x00') sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000980)=[{&(0x7f00000002c0)="d56bd4fd70703a", 0x7}], 0x1}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffcca}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000cc0)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0xe80, 0x3580, &(0x7f0000000280)="b95b03b707030000009e4ef086dd", 0x0, 0xfd, 0x6000000000000000, 0x0, 0x0, 0x0, 0x0}, 0x40) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 01:40:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c0000000000", 0x45, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:40:21 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 269.222064][T11922] loop2: detected capacity change from 0 to 140 [ 269.231978][T11923] loop4: detected capacity change from 0 to 1024 [ 269.241244][T11922] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (41408!=39978) [ 269.254908][T11928] loop3: detected capacity change from 0 to 1024 [ 269.278877][T11923] EXT4-fs (loop4): Test dummy encryption mode enabled [ 269.286926][T11928] EXT4-fs (loop3): Test dummy encryption mode enabled [ 269.323411][T11922] EXT4-fs (loop2): group descriptors corrupted! [ 269.337137][T11923] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 269.362927][T11928] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 01:40:22 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) write$cgroup_type(r0, &(0x7f0000000340)='threaded\x00', 0x9) [ 269.429346][T11928] EXT4-fs error (device loop3): ext4_fill_super:4942: inode #2: comm syz-executor.3: iget: root inode unallocated 01:40:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00"/81, 0x51, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:40:22 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x2, 0x3, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 01:40:22 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 269.585258][T11928] EXT4-fs (loop3): get root inode failed [ 269.611574][T11928] EXT4-fs (loop3): mount failed 01:40:22 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x3, 0x3, &(0x7f0000000140)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 269.709848][T11945] loop4: detected capacity change from 0 to 1024 [ 269.719460][T11948] loop2: detected capacity change from 0 to 140 [ 269.758478][T11948] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (41408!=39978) [ 269.784079][T11945] EXT4-fs (loop4): Test dummy encryption mode enabled 01:40:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1500}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 269.822052][T11948] EXT4-fs (loop2): group descriptors corrupted! [ 269.832212][T11945] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 270.004206][T11961] loop3: detected capacity change from 0 to 1024 [ 270.015275][T11961] EXT4-fs (loop3): Test dummy encryption mode enabled [ 270.022696][T11961] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 270.035649][T11961] EXT4-fs error (device loop3): ext4_fill_super:4942: inode #2: comm syz-executor.3: iget: root inode unallocated [ 270.065270][T11961] EXT4-fs (loop3): get root inode failed [ 270.070917][T11961] EXT4-fs (loop3): mount failed 01:40:23 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) 01:40:23 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x7, 0x4, 0x40000, 0x4000, 0x28}, 0x40) 01:40:23 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448e4, &(0x7f0000000000)='7') 01:40:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00"/81, 0x51, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:40:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1500}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 270.294467][T11975] loop4: detected capacity change from 0 to 1024 [ 270.303325][T11974] loop2: detected capacity change from 0 to 140 [ 270.303921][T11978] loop3: detected capacity change from 0 to 1024 01:40:23 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0xe, 0x3, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1085}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 270.354646][T11974] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (41408!=39978) [ 270.364259][T11974] EXT4-fs (loop2): group descriptors corrupted! [ 270.371817][T11975] EXT4-fs (loop4): Test dummy encryption mode enabled 01:40:23 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000002dc0)={0x0, 0x0, &(0x7f0000001a80)=[{&(0x7f0000000680)='&', 0x1}], 0x1}, 0x80d0) [ 270.403209][T11975] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 270.426527][T11978] EXT4-fs (loop3): Test dummy encryption mode enabled 01:40:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00"/81, 0x51, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 270.470517][T11978] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 01:40:23 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 270.528710][T11978] EXT4-fs error (device loop3): ext4_fill_super:4942: inode #2: comm syz-executor.3: iget: root inode unallocated 01:40:23 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000140)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 270.585005][T11999] loop4: detected capacity change from 0 to 1024 [ 270.592866][T12001] loop2: detected capacity change from 0 to 140 [ 270.615817][T11999] EXT4-fs (loop4): Test dummy encryption mode enabled [ 270.623532][T11978] EXT4-fs (loop3): get root inode failed [ 270.668175][T11978] EXT4-fs (loop3): mount failed [ 270.673418][T12001] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (41408!=39978) [ 270.683610][T11999] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 270.699114][T12001] EXT4-fs (loop2): group descriptors corrupted! 01:40:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00"/87, 0x57, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 270.865700][T12013] loop2: detected capacity change from 0 to 140 [ 270.890126][T12013] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (41408!=39978) [ 270.958609][T12013] EXT4-fs (loop2): group descriptors corrupted! 01:40:24 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) 01:40:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1500}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={0x0, &(0x7f0000000400)=""/178, 0x1000000, 0xb2, 0x1}, 0x20) 01:40:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00"/87, 0x57, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 271.335034][T12023] loop4: detected capacity change from 0 to 1024 [ 271.374064][T12031] loop3: detected capacity change from 0 to 1024 01:40:24 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x5) r1 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x2, r0, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000004c0)=0x40005f11) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r3 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000180)='&+$\x00') r4 = socket$kcm(0x11, 0x2, 0x300) perf_event_open(&(0x7f0000000780)={0x5, 0x70, 0x80, 0x0, 0x9, 0x7, 0x0, 0x3, 0x20000, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x548, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x8, 0xfff, 0x6f}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) setsockopt$sock_attach_bpf(r4, 0x1, 0x41, &(0x7f0000000000)=r5, 0x4) sendmsg$kcm(r4, &(0x7f0000000640)={&(0x7f0000000040)=@caif=@rfm={0x25, 0x1f, "34b0d00b45eddb3bc5582e88086d0216"}, 0x80, 0x0}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000), 0x70db2da734432a8e) recvmsg(r4, &(0x7f000000cd00)={0x0, 0xe000000, 0x0}, 0x2000) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x103) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) [ 271.374927][T12029] loop2: detected capacity change from 0 to 140 [ 271.389396][T12023] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 271.398486][T12031] EXT4-fs (loop3): Test dummy encryption mode enabled [ 271.405907][T12031] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 01:40:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 271.437351][T12029] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (41408!=39978) [ 271.472791][T12031] EXT4-fs error (device loop3): ext4_fill_super:4942: inode #2: comm syz-executor.3: iget: root inode unallocated [ 271.515465][T12031] EXT4-fs (loop3): get root inode failed [ 271.521515][T12031] EXT4-fs (loop3): mount failed [ 271.524569][T12029] EXT4-fs (loop2): group descriptors corrupted! 01:40:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00"/87, 0x57, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 271.591652][T12045] loop4: detected capacity change from 0 to 1024 [ 271.699569][T12045] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 01:40:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00), 0x0, 0x1500}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:24 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x5) r1 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x2, r0, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000004c0)=0x40005f11) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r3 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000180)='&+$\x00') r4 = socket$kcm(0x11, 0x2, 0x300) perf_event_open(&(0x7f0000000780)={0x5, 0x70, 0x80, 0x0, 0x9, 0x7, 0x0, 0x3, 0x20000, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x548, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x8, 0xfff, 0x6f}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001a00)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000fbffffff2d6405000000000065040400010000000404000001007d60b7030000080000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e0fcb3dfd4e70ebec677d6ac14c2c794f72cbf4143919be70227bfd8115efd90c8c48258f8dbe82e16cf0000000000000000006e60000000000000000000000000000000790ae2fd45d54b107c8c000000000000520ad6707432ff48bc085760314166443ce72c74f3db890e1ff15a10d91f27e9b232fe2238fff867ba8fd41b29f088d47c7cc54c64caad2a986e0e244bd11747ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd3135480dae93c7e33bdef00000000d8fd8c79a5d0967ab7e43686b4d1e03e326beea7905ef735dc5ef8bc8143df20d13c37db269971210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b5dd884137d5f7a6edba86a7f9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f919746bb4b84c16fd56ee450e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000053c3f01ea714a7bd4fad615ff6e2991589bbdd1ae0d1bce65c620c4a2527a82afe16e019a5e0b5ec1b1b8aafba090000c3630488edcc4a8cbd3246e962b773a75b28a51cd09cbcb3577fea6f1e9fe8cd2b532c084ca609000000000000b256acf183d8e55580a678c664813354f14a453b093948d49bca31a71704199d1d32f256ff3010e69b2f0482c63ab78a74dec8b1405e7daef356602487886b6f0beb5ca9a9b31a57e25525fa0ff5c2226e79db12959e59f2c911ee035c82f1a81ef15b43d51ff1fa025bfb80674cd17c1e4d8de1b5881df2b0f0695997dc2b7f3f88df4592"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) setsockopt$sock_attach_bpf(r4, 0x1, 0x41, &(0x7f0000000000)=r5, 0x4) sendmsg$kcm(r4, &(0x7f0000000640)={&(0x7f0000000040)=@caif=@rfm={0x25, 0x1f, "34b0d00b45eddb3bc5582e88086d0216"}, 0x80, 0x0}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000), 0x70db2da734432a8e) recvmsg(r4, &(0x7f000000cd00)={0x0, 0xe000000, 0x0}, 0x2000) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x103) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 01:40:24 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:24 executing program 5: bpf$BPF_BTF_LOAD(0x10, &(0x7f00000004c0)={0x0, &(0x7f0000000400)=""/178, 0x34, 0xb2}, 0x20) [ 271.884973][T12057] loop2: detected capacity change from 0 to 140 [ 271.942686][T12057] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (41408!=39978) [ 272.002843][T12062] loop3: detected capacity change from 0 to 1024 [ 272.017979][T12057] EXT4-fs (loop2): group descriptors corrupted! [ 272.031406][T12062] EXT4-fs (loop3): Test dummy encryption mode enabled [ 272.062820][T12069] loop4: detected capacity change from 0 to 1024 [ 272.110978][T12062] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 272.197981][T12069] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 01:40:25 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000), 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) 01:40:25 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x11}, 0x40) 01:40:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ec", 0x5a, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 272.260072][T12062] EXT4-fs error (device loop3): ext4_fill_super:4942: inode #2: comm syz-executor.3: iget: root inode unallocated 01:40:25 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x5) r1 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x2, r0, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000004c0)=0x40005f11) r2 = socket$kcm(0xa, 0x2, 0x73) sendmsg(r2, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) r3 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000180)='&+$\x00') r4 = socket$kcm(0x11, 0x2, 0x300) perf_event_open(&(0x7f0000000780)={0x5, 0x70, 0x80, 0x0, 0x9, 0x7, 0x0, 0x3, 0x20000, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x548, 0x1, @perf_config_ext, 0x800, 0x0, 0x0, 0x8, 0xfff, 0x6f}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001a00)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000fbffffff2d6405000000000065040400010000000404000001007d60b7030000080000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d18ad181867514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e0fcb3dfd4e70ebec677d6ac14c2c794f72cbf4143919be70227bfd8115efd90c8c48258f8dbe82e16cf0000000000000000006e60000000000000000000000000000000790ae2fd45d54b107c8c000000000000520ad6707432ff48bc085760314166443ce72c74f3db890e1ff15a10d91f27e9b232fe2238fff867ba8fd41b29f088d47c7cc54c64caad2a986e0e244bd11747ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd3135480dae93c7e33bdef00000000d8fd8c79a5d0967ab7e43686b4d1e03e326beea7905ef735dc5ef8bc8143df20d13c37db269971210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b5dd884137d5f7a6edba86a7f9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f919746bb4b84c16fd56ee450e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000053c3f01ea714a7bd4fad615ff6e2991589bbdd1ae0d1bce65c620c4a2527a82afe16e019a5e0b5ec1b1b8aafba090000c3630488edcc4a8cbd3246e962b773a75b28a51cd09cbcb3577fea6f1e9fe8cd2b532c084ca609000000000000b256acf183d8e55580a678c664813354f14a453b093948d49bca31a71704199d1d32f256ff3010e69b2f0482c63ab78a74dec8b1405e7daef356602487886b6f0beb5ca9a9b31a57e25525fa0ff5c2226e79db12959e59f2c911ee035c82f1a81ef15b43d51ff1fa025bfb80674cd17c1e4d8de1b5881df2b0f0695997dc2b7f3f88df4592"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) setsockopt$sock_attach_bpf(r4, 0x1, 0x41, &(0x7f0000000000)=r5, 0x4) sendmsg$kcm(r4, &(0x7f0000000640)={&(0x7f0000000040)=@caif=@rfm={0x25, 0x1f, "34b0d00b45eddb3bc5582e88086d0216"}, 0x80, 0x0}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000), 0x70db2da734432a8e) recvmsg(r4, &(0x7f000000cd00)={0x0, 0xe000000, 0x0}, 0x2000) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x103) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 01:40:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 272.364851][T12062] EXT4-fs (loop3): get root inode failed [ 272.370573][T12062] EXT4-fs (loop3): mount failed [ 272.440363][T12086] loop2: detected capacity change from 0 to 140 01:40:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00), 0x0, 0x1500}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 272.481740][T12086] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (61830!=39978) [ 272.493015][T12086] EXT4-fs (loop2): group descriptors corrupted! 01:40:25 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_tracing={0x1a, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x373, 0x0, 0x0, 0x0, 0x7}, [@alu={0x4, 0x0, 0x4, 0x3, 0x1d513f1b98d46a2f, 0xfffffffffffffff0, 0xfffffffffffffff0}]}, &(0x7f00000002c0)='syzkaller\x00', 0x6, 0xf7, &(0x7f0000000300)=""/247, 0x41100, 0x12, [], 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x2, 0xe, 0x9, 0x1c}, 0x10, 0x26fd9}, 0x78) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_es_lookup_extent_exit\x00', r2}, 0x10) r3 = gettid() perf_event_open(&(0x7f0000001700)={0x8, 0x70, 0x0, 0xfe, 0x7, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000016c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, r3, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r4, &(0x7f0000000200), 0x43408) [ 272.533352][T12092] loop4: detected capacity change from 0 to 1024 [ 272.602541][T12092] EXT4-fs (loop4): Test dummy encryption mode enabled 01:40:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ec", 0x5a, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 272.661572][T12092] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 01:40:25 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0xa6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x4ea00) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x2, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)=0x443000033) [ 272.725256][T12092] EXT4-fs (loop4): group descriptors corrupted! [ 272.770684][T12102] loop3: detected capacity change from 0 to 1024 [ 272.835418][T12102] EXT4-fs (loop3): Test dummy encryption mode enabled 01:40:25 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 272.879772][T12109] loop2: detected capacity change from 0 to 140 [ 272.888784][T12102] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 272.901236][T12109] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (61830!=39978) [ 272.928581][T12109] EXT4-fs (loop2): group descriptors corrupted! [ 272.963087][T12102] EXT4-fs error (device loop3): ext4_fill_super:4942: inode #2: comm syz-executor.3: iget: root inode unallocated [ 273.000730][T12102] EXT4-fs (loop3): get root inode failed 01:40:25 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0xe, 0x3, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 273.013667][T12102] EXT4-fs (loop3): mount failed [ 273.042080][T12118] loop4: detected capacity change from 0 to 1024 [ 273.060971][T12118] EXT4-fs (loop4): Test dummy encryption mode enabled [ 273.071994][T12118] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 273.081458][T12118] EXT4-fs (loop4): group descriptors corrupted! 01:40:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ec", 0x5a, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:40:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010418"], &(0x7f0000000400)=""/178, 0x34, 0xb2, 0x1}, 0x20) 01:40:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00), 0x0, 0x1500}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:26 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x7, 0x3, &(0x7f0000000140)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 273.278352][T12128] loop2: detected capacity change from 0 to 140 01:40:26 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_tracing={0x1a, 0x4, &(0x7f0000000180)=@framed={{}, [@alu={0x0, 0x0, 0x4, 0x3, 0x1d513f1b98d46a2f, 0xfffffffffffffff0}]}, &(0x7f00000002c0)='syzkaller\x00', 0x6, 0xf7, &(0x7f0000000300)=""/247, 0x41100, 0x12, [], 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x8}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xe, 0x9, 0x1c}, 0x10, 0x26fd9}, 0x78) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r0, 0x9) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001580)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_es_lookup_extent_exit\x00', r2}, 0x10) gettid() perf_event_open(&(0x7f0000001700)={0x8, 0x70, 0x0, 0xfe, 0x7, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x40, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) [ 273.324917][T12128] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (61830!=39978) 01:40:26 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400ca, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/time\x00') perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.weight\x00', 0x2, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2121) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020662a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) [ 273.397097][T12138] loop3: detected capacity change from 0 to 1024 [ 273.402321][T12128] EXT4-fs (loop2): group descriptors corrupted! [ 273.408282][T12140] loop4: detected capacity change from 0 to 1024 [ 273.420960][T12140] EXT4-fs (loop4): Test dummy encryption mode enabled [ 273.430464][T12140] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 273.441815][T12140] EXT4-fs (loop4): group descriptors corrupted! 01:40:26 executing program 5: r0 = getpid() perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x6, 0x11, 0x80, 0x30, 0x0, 0xfffffffffffffffd, 0x100, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x25, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x1008, 0x1, 0x1c, 0x6, 0x8, 0x4b5046f}, r0, 0xd, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000080)) r1 = perf_event_open(0x0, r0, 0xf, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x4, 0x8, 0x7, 0x0, 0x4, 0x40004, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x52dd}, 0x0, 0x4, 0x1, 0x5, 0x0, 0x400, 0x40}, r0, 0xa, r1, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext={0x0, 0x8000000000000000}, 0x4050, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x12, 0x1, &(0x7f00000007c0)=ANY=[@ANYBLOB], 0x0, 0x6, 0x68, &(0x7f0000000440)=""/104, 0x41100, 0x0, [], 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0xe, 0x2, 0x480}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000640)={&(0x7f0000000380)=@ipx={0x4, 0x5, 0x6, "0d97f4c74198", 0x9}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="9b974be42f87eecca871327857ad972f1b2a94d7934e17", 0x17}], 0x1, &(0x7f0000000940)=ANY=[@ANYBLOB="c0000000000000002a0300000700000047eeff584e32a45c8073ed7232002b7abe2bf780104272fe24a0fe741de835e94564659c4dfc7ab326fbfbddae815211c23cf2b482cac25080104bcd9d8c7d83bb3a05348ea4c026c07e746e7feee96119112cd1a0ff59d21d6f2ee14ace401b32330db8a2bd75c2feebe21ed25dd846ef35144eb09e11a79737f23148286ebdbe1faf2ba7a52914979c6b65d6770d567013f19347379e207506eb1d7bffe1b3b91965b625a86698ae20aca7d1927e42952c71000000"], 0xc0}, 0x20000001) sendmsg$kcm(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a001000000002", 0x29}, {&(0x7f0000000140)="3d4f40a9c419", 0x6}], 0x2}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x40, 0x84, 0x0, 0x0, 0x202, 0x1810, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x2000000003, 0x2, &(0x7f0000000a80)) [ 273.473934][T12138] EXT4-fs (loop3): Test dummy encryption mode enabled [ 273.502447][T12138] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 273.517959][T12138] EXT4-fs error (device loop3): ext4_fill_super:4942: inode #2: comm syz-executor.3: iget: root inode unallocated [ 273.530646][T12138] EXT4-fs (loop3): get root inode failed [ 273.537828][T12138] EXT4-fs (loop3): mount failed 01:40:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, 0x0) 01:40:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd1", 0x5b, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:40:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf465", 0xf, 0x1500}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:26 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_tracing={0x1a, 0x4, &(0x7f0000000180)=@framed={{}, [@alu={0x0, 0x0, 0x4, 0x3, 0x1d513f1b98d46a2f, 0xfffffffffffffff0}]}, &(0x7f00000002c0)='syzkaller\x00', 0x6, 0xf7, &(0x7f0000000300)=""/247, 0x41100, 0x12, [], 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x8}, 0x8, 0x10, &(0x7f0000000440)={0x0, 0xe, 0x9, 0x1c}, 0x10, 0x26fd9}, 0x78) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r0, 0x9) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001580)='cgroup.subtree_control\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_es_lookup_extent_exit\x00', r2}, 0x10) gettid() perf_event_open(&(0x7f0000001700)={0x8, 0x70, 0x0, 0xfe, 0x7, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x40, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r3, &(0x7f0000000200), 0x43408) [ 273.845507][T12168] loop3: detected capacity change from 0 to 1024 [ 273.859153][T12160] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 273.871930][T12167] loop2: detected capacity change from 0 to 140 [ 273.888243][T12172] loop4: detected capacity change from 0 to 1024 01:40:26 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400ca, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/time\x00') perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.weight\x00', 0x2, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2121) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020662a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) [ 273.888941][T12168] EXT4-fs (loop3): Test dummy encryption mode enabled [ 273.910860][T12167] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (18076!=39978) [ 273.931520][T12168] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 273.998337][T12167] EXT4-fs (loop2): group descriptors corrupted! [ 274.002693][T12160] team0: Device ipvlan1 failed to register rx_handler [ 274.122183][T12168] EXT4-fs error (device loop3): ext4_fill_super:4942: inode #2: comm syz-executor.3: iget: root inode unallocated 01:40:26 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, 0x0) [ 274.174779][T12168] EXT4-fs (loop3): get root inode failed [ 274.180805][T12168] EXT4-fs (loop3): mount failed 01:40:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd1", 0x5b, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) 01:40:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf465", 0xf, 0x1500}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) 01:40:27 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x2, 0x3, &(0x7f0000000140)=@framed={{0x61}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 01:40:27 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400ca, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/time\x00') perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.weight\x00', 0x2, 0x0) socket$kcm(0xa, 0x0, 0x11) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x2121) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc020662a, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) [ 274.519152][T12195] loop4: detected capacity change from 0 to 1024 [ 274.538516][T12196] loop2: detected capacity change from 0 to 140 [ 274.541256][T12160] syz-executor.5 (12160) used greatest stack depth: 22736 bytes left 01:40:27 executing program 5: r0 = getpid() perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x6, 0x11, 0x80, 0x30, 0x0, 0xfffffffffffffffd, 0x100, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x25, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x1008, 0x1, 0x1c, 0x6, 0x8, 0x4b5046f}, r0, 0xd, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000080)) r1 = perf_event_open(0x0, r0, 0xf, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x4, 0x8, 0x7, 0x0, 0x4, 0x40004, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x52dd}, 0x0, 0x4, 0x1, 0x5, 0x0, 0x400, 0x40}, r0, 0xa, r1, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext={0x0, 0x8000000000000000}, 0x4050, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x12, 0x1, &(0x7f00000007c0)=ANY=[@ANYBLOB], 0x0, 0x6, 0x68, &(0x7f0000000440)=""/104, 0x41100, 0x0, [], 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0xe, 0x2, 0x480}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000640)={&(0x7f0000000380)=@ipx={0x4, 0x5, 0x6, "0d97f4c74198", 0x9}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="9b974be42f87eecca871327857ad972f1b2a94d7934e17", 0x17}], 0x1, &(0x7f0000000940)=ANY=[@ANYBLOB="c0000000000000002a0300000700000047eeff584e32a45c8073ed7232002b7abe2bf780104272fe24a0fe741de835e94564659c4dfc7ab326fbfbddae815211c23cf2b482cac25080104bcd9d8c7d83bb3a05348ea4c026c07e746e7feee96119112cd1a0ff59d21d6f2ee14ace401b32330db8a2bd75c2feebe21ed25dd846ef35144eb09e11a79737f23148286ebdbe1faf2ba7a52914979c6b65d6770d567013f19347379e207506eb1d7bffe1b3b91965b625a86698ae20aca7d1927e42952c71000000"], 0xc0}, 0x20000001) sendmsg$kcm(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a001000000002", 0x29}, {&(0x7f0000000140)="3d4f40a9c419", 0x6}], 0x2}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x40, 0x84, 0x0, 0x0, 0x202, 0x1810, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x2000000003, 0x2, &(0x7f0000000a80)) [ 274.614207][T12196] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (18076!=39978) 01:40:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, 0x0) [ 274.682503][T12196] EXT4-fs (loop2): group descriptors corrupted! [ 274.732367][T12205] loop3: detected capacity change from 0 to 1024 [ 274.762429][T12205] EXT4-fs (loop3): Test dummy encryption mode enabled [ 274.770934][T12205] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 274.810642][T12205] EXT4-fs error (device loop3): ext4_fill_super:4942: inode #2: comm syz-executor.3: iget: root inode unallocated 01:40:27 executing program 0: r0 = getpid() perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x6, 0x11, 0x80, 0x30, 0x0, 0xfffffffffffffffd, 0x100, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x25, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x1008, 0x1, 0x1c, 0x6, 0x8, 0x4b5046f}, r0, 0xd, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000080)) r1 = perf_event_open(0x0, r0, 0xf, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x4, 0x8, 0x7, 0x0, 0x4, 0x40004, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x52dd}, 0x0, 0x4, 0x1, 0x5, 0x0, 0x400, 0x40}, r0, 0xa, r1, 0x2) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext={0x0, 0x8000000000000000}, 0x4050, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000002c0), 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x12, 0x1, &(0x7f00000007c0)=ANY=[@ANYBLOB], 0x0, 0x6, 0x68, &(0x7f0000000440)=""/104, 0x41100, 0x0, [], 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000700)={0x4, 0xe, 0x2, 0x480}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000640)={&(0x7f0000000380)=@ipx={0x4, 0x5, 0x6, "0d97f4c74198", 0x9}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000300)="9b974be42f87eecca871327857ad972f1b2a94d7934e17", 0x17}], 0x1, &(0x7f0000000940)=ANY=[@ANYBLOB="c0000000000000002a0300000700000047eeff584e32a45c8073ed7232002b7abe2bf780104272fe24a0fe741de835e94564659c4dfc7ab326fbfbddae815211c23cf2b482cac25080104bcd9d8c7d83bb3a05348ea4c026c07e746e7feee96119112cd1a0ff59d21d6f2ee14ace401b32330db8a2bd75c2feebe21ed25dd846ef35144eb09e11a79737f23148286ebdbe1faf2ba7a52914979c6b65d6770d567013f19347379e207506eb1d7bffe1b3b91965b625a86698ae20aca7d1927e42952c71000000"], 0xc0}, 0x20000001) sendmsg$kcm(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a001000000002", 0x29}, {&(0x7f0000000140)="3d4f40a9c419", 0x6}], 0x2}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x40, 0x84, 0x0, 0x0, 0x202, 0x1810, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x2000000003, 0x2, &(0x7f0000000a80)) 01:40:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd1", 0x5b, 0x7e0}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 274.939869][T12205] EXT4-fs (loop3): get root inode failed [ 274.945315][T12218] loop4: detected capacity change from 0 to 1024 [ 275.057787][T12224] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 275.086891][T12224] team0: Device ipvlan1 failed to register rx_handler [ 275.095852][T12205] EXT4-fs (loop3): mount failed [ 275.106559][T12225] loop2: detected capacity change from 0 to 140 [ 275.141613][T12225] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (18076!=39978) 01:40:27 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[]) 01:40:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf465", 0xf, 0x1500}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 275.234942][T12225] EXT4-fs (loop2): group descriptors corrupted! 01:40:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x1}]}}, &(0x7f0000000500)=""/183, 0x26, 0xb7, 0x1}, 0x20) 01:40:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 275.381510][T12241] loop4: detected capacity change from 0 to 1024 [ 275.399854][T12241] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 275.444994][T12241] EXT4-fs error (device loop4): ext4_fill_super:4942: inode #2: comm syz-executor.4: iget: root inode unallocated [ 275.459785][T12246] loop3: detected capacity change from 0 to 1024 01:40:28 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000004540)={0x2}, 0x40) [ 275.488917][T12241] EXT4-fs (loop4): get root inode failed [ 275.522663][T12246] EXT4-fs (loop3): Test dummy encryption mode enabled [ 275.528388][T12241] EXT4-fs (loop4): mount failed [ 275.538279][T12252] loop2: detected capacity change from 0 to 140 [ 275.556072][T12246] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 275.576092][T12246] EXT4-fs error (device loop3): ext4_fill_super:4942: inode #2: comm syz-executor.3: iget: root inode unallocated [ 275.609806][T12246] EXT4-fs (loop3): get root inode failed [ 275.619412][T12246] EXT4-fs (loop3): mount failed [ 275.623100][T12252] EXT4-fs (loop2): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? 01:40:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000", 0x16, 0x1500}], 0x81, &(0x7f0000000140)=ANY=[@ANYBLOB='test_dummy_encryption']) [ 275.704693][T12232] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 01:40:28 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x81, &(0x7f0000000140)=ANY=[]) 01:40:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c}, {&(0x7f00000004c0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003", 0x3b, 0x8c60}], 0x0, &(0x7f0000010f60)) [ 275.882407][T12232] team0: Device ipvlan1 failed to register rx_handler 01:40:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000740)=ANY=[@ANYBLOB="9feb01001800000000000000100000001000000008000000070000000000000e"], &(0x7f0000000040)=""/186, 0x30, 0xba, 0x1}, 0x20) 01:40:28 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x7, 0x0, 0x0, 0x0, 0x2}, 0x40) [ 275.962242][T12263] loop3: detected capacity change from 0 to 1024 [ 275.969432][T12264] loop4: detected capacity change from 0 to 1024 [ 275.998869][T12263] EXT4-fs (loop3): Test dummy encryption mode enabled [ 276.023458][T12263] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 276.043393][T12264] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 276.078882][T12263] EXT4-fs error (device loop3): ext4_fill_super:4942: inode #2: comm syz-executor.3: iget: root inode unallocated [ 276.095419][T12264] EXT4-fs error (device loop4): ext4_fill_super:4942: inode #2: comm syz-executor.4: iget: root inode unallocated [ 276.101065][T12263] EXT4-fs (loop3): get root inode failed [ 276.130395][T12263] EXT4-fs (loop3): mount failed [ 276.146555][T12264] EXT4-fs (loop4): get root inode failed [ 276.168678][T12264] EXT4-fs (loop4): mount failed [ 276.231887][T12264] ------------[ cut here ]------------ [ 276.237363][T12264] ODEBUG: free active (active state 0) object type: timer_list hint: print_daily_error_info+0x0/0x1f0 [ 276.248817][T12264] WARNING: CPU: 1 PID: 12264 at lib/debugobjects.c:505 debug_print_object+0x16e/0x250 [ 276.258405][T12264] Modules linked in: [ 276.262310][T12264] CPU: 1 PID: 12264 Comm: syz-executor.4 Not tainted 5.12.0-rc1-syzkaller #0 [ 276.271087][T12264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.281160][T12264] RIP: 0010:debug_print_object+0x16e/0x250 [ 276.286998][T12264] Code: ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 af 00 00 00 48 8b 14 dd e0 01 bf 89 4c 89 ee 48 c7 c7 e0 f5 be 89 e8 5e 7a fb 04 <0f> 0b 83 05 35 89 ff 09 01 48 83 c4 18 5b 5d 41 5c 41 5d 41 5e c3 [ 276.306623][T12264] RSP: 0018:ffffc90001dc7a18 EFLAGS: 00010082 [ 276.312708][T12264] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 276.320694][T12264] RDX: 0000000000040000 RSI: ffffffff815bd195 RDI: fffff520003b8f35 [ 276.328681][T12264] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 [ 276.336668][T12264] R10: ffffffff815b623e R11: 0000000000000000 R12: ffffffff896d7c80 [ 276.344667][T12264] R13: ffffffff89befc20 R14: ffffffff81625f10 R15: dffffc0000000000 [ 276.352655][T12264] FS: 00007f8074eae700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 276.361606][T12264] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 276.368208][T12264] CR2: 0000000000568000 CR3: 0000000013069000 CR4: 00000000001506e0 [ 276.376194][T12264] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 276.384181][T12264] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 276.392184][T12264] Call Trace: [ 276.395473][T12264] ? do_raw_spin_unlock+0x171/0x230 [ 276.400716][T12264] debug_check_no_obj_freed+0x301/0x420 [ 276.406293][T12264] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 276.412563][T12264] kfree+0xd1/0x2a0 [ 276.420917][T12264] ext4_fill_super+0x84f/0xded0 [ 276.425825][T12264] ? ext4_calculate_overhead+0x13a0/0x13a0 [ 276.431660][T12264] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 276.437404][T12264] ? set_blocksize+0x1c1/0x400 [ 276.442202][T12264] mount_bdev+0x34d/0x410 [ 276.446558][T12264] ? ext4_calculate_overhead+0x13a0/0x13a0 [ 276.452388][T12264] ? rcu_read_unlock+0xa0/0xa0 [ 276.457174][T12264] legacy_get_tree+0x105/0x220 [ 276.461965][T12264] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 276.468233][T12264] vfs_get_tree+0x89/0x2f0 [ 276.472674][T12264] path_mount+0x132a/0x1f90 [ 276.477209][T12264] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 276.483475][T12264] ? strncpy_from_user+0x2a0/0x3e0 [ 276.488614][T12264] ? finish_automount+0xad0/0xad0 [ 276.493660][T12264] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 276.499926][T12264] ? getname_flags.part.0+0x1dd/0x4f0 [ 276.505343][T12264] __x64_sys_mount+0x27f/0x300 [ 276.510137][T12264] ? copy_mnt_ns+0xae0/0xae0 [ 276.514754][T12264] ? syscall_enter_from_user_mode+0x1d/0x50 [ 276.520726][T12264] do_syscall_64+0x2d/0x70 [ 276.525218][T12264] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 276.531165][T12264] RIP: 0033:0x46741a [ 276.535072][T12264] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 276.554696][T12264] RSP: 002b:00007f8074eadfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 276.563130][T12264] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046741a [ 276.571121][T12264] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f8074eae000 [ 276.579114][T12264] RBP: 00007f8074eae040 R08: 00007f8074eae040 R09: 0000000020000000 [ 276.587102][T12264] R10: 0000000000000081 R11: 0000000000000206 R12: 0000000020000000 [ 276.595099][T12264] R13: 0000000020000100 R14: 00007f8074eae000 R15: 0000000020000140 [ 276.603108][T12264] Kernel panic - not syncing: panic_on_warn set ... [ 276.609719][T12264] CPU: 1 PID: 12264 Comm: syz-executor.4 Not tainted 5.12.0-rc1-syzkaller #0 [ 276.622228][T12264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.632296][T12264] Call Trace: [ 276.635586][T12264] dump_stack+0xfa/0x151 [ 276.639946][T12264] panic+0x306/0x73d [ 276.643872][T12264] ? __warn_printk+0xf3/0xf3 [ 276.648482][T12264] ? __warn.cold+0x1a/0x44 [ 276.652916][T12264] ? debug_print_object+0x16e/0x250 [ 276.658139][T12264] __warn.cold+0x35/0x44 [ 276.662394][T12264] ? wake_up_klogd.part.0+0x8e/0xd0 [ 276.667616][T12264] ? debug_print_object+0x16e/0x250 [ 276.672837][T12264] report_bug+0x1bd/0x210 [ 276.677192][T12264] handle_bug+0x3c/0x60 [ 276.681373][T12264] exc_invalid_op+0x14/0x40 [ 276.685901][T12264] asm_exc_invalid_op+0x12/0x20 [ 276.690780][T12264] RIP: 0010:debug_print_object+0x16e/0x250 [ 276.696608][T12264] Code: ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 af 00 00 00 48 8b 14 dd e0 01 bf 89 4c 89 ee 48 c7 c7 e0 f5 be 89 e8 5e 7a fb 04 <0f> 0b 83 05 35 89 ff 09 01 48 83 c4 18 5b 5d 41 5c 41 5d 41 5e c3 [ 276.716227][T12264] RSP: 0018:ffffc90001dc7a18 EFLAGS: 00010082 [ 276.722317][T12264] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 276.730300][T12264] RDX: 0000000000040000 RSI: ffffffff815bd195 RDI: fffff520003b8f35 [ 276.738287][T12264] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 [ 276.746270][T12264] R10: ffffffff815b623e R11: 0000000000000000 R12: ffffffff896d7c80 [ 276.754279][T12264] R13: ffffffff89befc20 R14: ffffffff81625f10 R15: dffffc0000000000 [ 276.762267][T12264] ? calc_wheel_index+0x3f0/0x3f0 [ 276.767760][T12264] ? wake_up_klogd.part.0+0x8e/0xd0 [ 276.772989][T12264] ? vprintk_func+0x95/0x1e0 [ 276.777625][T12264] ? debug_print_object+0x16e/0x250 [ 276.782825][T12264] ? do_raw_spin_unlock+0x171/0x230 [ 276.788037][T12264] debug_check_no_obj_freed+0x301/0x420 [ 276.793581][T12264] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 276.799822][T12264] kfree+0xd1/0x2a0 [ 276.803648][T12264] ext4_fill_super+0x84f/0xded0 [ 276.808520][T12264] ? ext4_calculate_overhead+0x13a0/0x13a0 [ 276.814344][T12264] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 276.820065][T12264] ? set_blocksize+0x1c1/0x400 [ 276.824869][T12264] mount_bdev+0x34d/0x410 [ 276.829197][T12264] ? ext4_calculate_overhead+0x13a0/0x13a0 [ 276.834999][T12264] ? rcu_read_unlock+0xa0/0xa0 [ 276.839760][T12264] legacy_get_tree+0x105/0x220 [ 276.844521][T12264] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 276.850869][T12264] vfs_get_tree+0x89/0x2f0 [ 276.855286][T12264] path_mount+0x132a/0x1f90 [ 276.859790][T12264] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 276.866027][T12264] ? strncpy_from_user+0x2a0/0x3e0 [ 276.871139][T12264] ? finish_automount+0xad0/0xad0 [ 276.876162][T12264] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 276.882399][T12264] ? getname_flags.part.0+0x1dd/0x4f0 [ 276.887779][T12264] __x64_sys_mount+0x27f/0x300 [ 276.892550][T12264] ? copy_mnt_ns+0xae0/0xae0 [ 276.897136][T12264] ? syscall_enter_from_user_mode+0x1d/0x50 [ 276.903062][T12264] do_syscall_64+0x2d/0x70 [ 276.907477][T12264] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 276.913364][T12264] RIP: 0033:0x46741a [ 276.917251][T12264] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 276.936850][T12264] RSP: 002b:00007f8074eadfa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 276.945255][T12264] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000046741a [ 276.953216][T12264] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f8074eae000 [ 276.961176][T12264] RBP: 00007f8074eae040 R08: 00007f8074eae040 R09: 0000000020000000 [ 276.969153][T12264] R10: 0000000000000081 R11: 0000000000000206 R12: 0000000020000000 [ 276.977114][T12264] R13: 0000000020000100 R14: 00007f8074eae000 R15: 0000000020000140 [ 276.986002][T12264] Kernel Offset: disabled [ 276.990504][T12264] Rebooting in 86400 seconds..