07 [ 418.551970] block nbd4: Disconnected due to user request. [ 418.560936] bridge0: port 1(bridge_slave_0) entered disabled state [ 418.585627] block nbd4: shutting down sockets 20:20:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x2}, 0x700) 20:20:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x1f030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:20:54 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:20:54 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x404, @dev, 'lo\x00'}}, 0x1e) socketpair(0x18, 0x0, 0x0, 0x0) 20:20:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(sha224-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_DEL_MPATH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x20008004) accept4$inet6(r1, 0x0, 0x0, 0x0) 20:20:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 419.229615] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. 20:20:54 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:20:54 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000f65000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffbfbbfbe, &(0x7f000006ffe4)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) [ 419.274681] bridge0: port 1(bridge_slave_0) entered disabled state [ 419.288138] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 419.340998] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:20:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:20:54 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000280)={'veth1_macvtap\x00', &(0x7f0000000000)=@ethtool_pauseparam={0x28}}) [ 419.391987] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:20:54 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:20:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x20000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 419.614508] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 419.629776] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 419.639992] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:20:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x3}, 0x700) 20:20:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x28, 0x11, 0x40d, 0x0, 0x0, {}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}}, 0x0) 20:20:55 executing program 4: pipe(&(0x7f0000001800)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0x2) splice(r0, 0x0, r3, 0x0, 0xebe, 0x0) 20:20:55 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:20:55 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:20:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x20010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:20:55 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:20:55 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:20:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, 0x3, 0x8, 0x301, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_REPLIED={0x8}]}, @CTA_TIMEOUT_L3PROTO={0x6}]}, 0x30}}, 0x0) [ 420.223298] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:20:55 executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7fb}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)=@ipv6_getroute={0x1c, 0x1a, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}}, 0x1c}}, 0x0) [ 420.297854] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 420.331779] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:20:55 executing program 5: signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 20:20:55 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:20:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x4}, 0x700) 20:20:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x20020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:20:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:20:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r0, &(0x7f0000001300)={0x0, 0x9effffff, &(0x7f0000000180)={&(0x7f0000000640)={0x14, r1, 0x309, 0x0, 0x0, {0x17}}, 0x14}, 0x1, 0xa0028000}, 0x0) 20:20:56 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:20:56 executing program 5: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'wp512-generic\x00'}, 0x58) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) r4 = accept4(r2, 0x0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0xfffffe3e) splice(r0, 0x0, r4, 0x0, 0x20000000003, 0x0) 20:20:56 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(0xffffffffffffffff, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) [ 421.137248] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:20:56 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x230, 0x0, 0x0, 0x98, 0x98, 0x0, 0x198, 0x198, 0x198, 0x198, 0x198, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0xffff}}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x290) 20:20:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:20:56 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(0xffffffffffffffff, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) [ 421.185571] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 421.249394] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:20:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x20030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:20:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000002c0)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r1, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c, 0x82, 'source_mac_is_multicast\x00'}, {0x5}}]}, 0x58}}, 0x0) [ 421.300232] xt_TCPMSS: path-MTU clamping only supported in FORWARD, OUTPUT and POSTROUTING hooks [ 421.397962] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 421.409556] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 421.424981] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:20:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x5}, 0x700) 20:20:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:20:57 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(0xffffffffffffffff, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:20:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x21000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:20:57 executing program 4: r0 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x46, 0x0, 0x0) sendmmsg(r0, &(0x7f0000002cc0), 0x1a3, 0x0) 20:20:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ip6vti={{0xb, 0x1, 'ip6vti\x00'}, {0x4}}}]}, 0x34}}, 0x0) 20:20:57 executing program 3: r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:20:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r0 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:20:57 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1c, 0x0, &(0x7f0000002540)) [ 422.044832] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:20:57 executing program 4: prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x2700) [ 422.100659] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 422.155040] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:20:57 executing program 3: r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:20:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x21010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 422.370330] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 422.399439] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 422.439547] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:20:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x7}, 0x700) 20:20:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@can_newroute={0x14c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "4f140af2199ee0d1"}, 0x3}}, @CGW_CS_CRC8={0x11e, 0x6, {0x30, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "6a4c9208085b7ce98bcf50f19a4a4acd67dcc6f7"}}]}, 0x14c}}, 0x0) 20:20:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r0 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:20:58 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = dup3(r1, r0, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000240)=@ethtool_dump={0x3f}}) 20:20:58 executing program 3: r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:20:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x21020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 422.916752] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:20:58 executing program 4: getsockname$packet(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000340)=0x12) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x71, &(0x7f00000002c0), &(0x7f0000000300)=0x10) 20:20:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r0 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:20:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@can_newroute={0x14c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "4f140af2199ee0d1"}, 0x3}}, @CGW_CS_CRC8={0x11e, 0x6, {0x30, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "6a4c9208085b7ce98bcf50f19a4a4acd67dcc6f7"}}]}, 0x14c}}, 0x0) 20:20:58 executing program 3: write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) [ 422.964334] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 423.013813] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:20:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x21030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:20:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@can_newroute={0x14c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "4f140af2199ee0d1"}, 0x3}}, @CGW_CS_CRC8={0x11e, 0x6, {0x30, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "6a4c9208085b7ce98bcf50f19a4a4acd67dcc6f7"}}]}, 0x14c}}, 0x0) [ 423.194740] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 423.215327] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 423.229743] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:20:58 executing program 3: write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:20:58 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r0, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:20:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000600)={0x2c, r1, 0x1, 0x0, 0x0, {0x4}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x2c}}, 0x0) 20:20:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@can_newroute={0x14c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "4f140af2199ee0d1"}, 0x3}}, @CGW_CS_CRC8={0x11e, 0x6, {0x30, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "6a4c9208085b7ce98bcf50f19a4a4acd67dcc6f7"}}]}, 0x14c}}, 0x0) 20:20:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x8}, 0x700) 20:20:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x22000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 423.853199] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:20:59 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r0, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:20:59 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@can_newroute={0x14c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "4f140af2199ee0d1"}, 0x3}}, @CGW_CS_CRC8={0x11e, 0x6, {0x30, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "6a4c9208085b7ce98bcf50f19a4a4acd67dcc6f7"}}]}, 0x14c}}, 0x0) 20:20:59 executing program 3: write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) [ 423.900600] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:20:59 executing program 4: r0 = socket(0x1d, 0x3, 0x1) close(r0) [ 423.959905] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:20:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x22010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:20:59 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@can_newroute={0x14c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "4f140af2199ee0d1"}, 0x3}}, @CGW_CS_CRC8={0x11e, 0x6, {0x30, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "6a4c9208085b7ce98bcf50f19a4a4acd67dcc6f7"}}]}, 0x14c}}, 0x0) 20:20:59 executing program 1: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r0, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:20:59 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:20:59 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x8, 0x400, 0x0, 0x1}, 0x40) bpf$MAP_CREATE(0x3, &(0x7f0000003000)={0x3, 0x0, 0x400000, 0x0, 0x0, 0x0}, 0x2c) 20:20:59 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 424.256012] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 424.300731] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 424.312074] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:20:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xa}, 0x700) 20:20:59 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@can_newroute={0x14c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "4f140af2199ee0d1"}, 0x3}}, @CGW_CS_CRC8={0x11e, 0x6, {0x30, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "6a4c9208085b7ce98bcf50f19a4a4acd67dcc6f7"}}]}, 0x14c}}, 0x0) 20:20:59 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:20:59 executing program 4: syz_emit_ethernet(0x9e, &(0x7f0000000200)={@broadcast, @random="5488a96aaa23", @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '@\x00', 0x68, 0x3a, 0xff, @dev, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x9, "a78ce540cd4f791153d5dea6b2590b1c71a8242373244ad2439adc07df0a69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a80302"}, {0x0, 0x1, "000000000000e5fffff9c600"}]}}}}}}, 0x0) 20:20:59 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:20:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x22020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:20:59 executing program 4: capset(&(0x7f00000002c0)={0x20080522}, &(0x7f0000000300)) r0 = socket$unix(0x1, 0x104000000000001, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setresgid(0x0, r1, 0x0) 20:21:00 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) [ 424.750738] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 424.789024] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:00 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:00 executing program 4: setresuid(0x0, 0xee01, 0xee00) keyctl$set_reqkey_keyring(0x4, 0xffffffffffffffff) [ 424.805372] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:00 executing program 5: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@can_newroute={0x14c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "4f140af2199ee0d1"}, 0x3}}, @CGW_CS_CRC8={0x11e, 0x6, {0x30, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "6a4c9208085b7ce98bcf50f19a4a4acd67dcc6f7"}}]}, 0x14c}}, 0x0) 20:21:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x22030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 425.026118] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 425.035644] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 425.045880] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xe}, 0x700) 20:21:00 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x0, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:21:00 executing program 4: clone(0x40000100065fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') r1 = getpid() tkill(r1, 0x38) write$P9_RCREATE(r0, 0x0, 0x0) 20:21:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r0, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:00 executing program 5: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@can_newroute={0x14c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "4f140af2199ee0d1"}, 0x3}}, @CGW_CS_CRC8={0x11e, 0x6, {0x30, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "6a4c9208085b7ce98bcf50f19a4a4acd67dcc6f7"}}]}, 0x14c}}, 0x0) 20:21:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x23000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:00 executing program 4: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x0, @dev}}, 0x1e) connect$pptp(r0, &(0x7f0000000240)={0x18, 0x2, {0x2, @loopback}}, 0x1e) 20:21:00 executing program 5: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@can_newroute={0x14c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "4f140af2199ee0d1"}, 0x3}}, @CGW_CS_CRC8={0x11e, 0x6, {0x30, 0x0, 0x0, 0x0, 0x0, "2b0461cfa6bc09f7aca5a3597cc4c70cb56160348b9149305554db7befcbfe73c71247687aed42718dd0fa98f713e910350b9a239298d52beb7f28a15755387e47ed02b73fc71298ce5ccd8e42c409a6ed0779c1d5c7a23251d5da02e138e0c66045f22f2630fea6543141810a17df837078d055264ff3f00859df89b2d45a1bd211ea1b7334bdb662e4256e90e7445f6dc2b78942b483a6296aa5a729fda0ac121686ad9b2e6806b2db9da31dd10d9aacd3701d30207a1fcd7b0aa26720484847daeab0523c120ce41e105943393d34a73e6c9e95b04bfe6eceec1cd1b1896eda5f8ce1bebe6d4aa424a8ba1b87e574656bb66f0b27ca716a4f6ce2e0df1a55", 0x0, "6a4c9208085b7ce98bcf50f19a4a4acd67dcc6f7"}}]}, 0x14c}}, 0x0) 20:21:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r0, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:00 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x0, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) [ 425.721621] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 425.782568] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 20:21:01 executing program 4: r0 = syz_open_dev$vivid(&(0x7f00000006c0)='/dev/video#\x00', 0x3, 0x2) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f00000000c0)) [ 425.825709] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xf}, 0x700) 20:21:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r0, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x23010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:01 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x0, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:21:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 20:21:01 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000280)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, 0xffffffffffffffff, 0x100000}}], 0x48}, 0x0) 20:21:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r0, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 20:21:01 executing program 4: futex(&(0x7f000000cffc), 0xa, 0x0, 0x0, 0x0, 0x1000000) 20:21:01 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x0, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) [ 426.593879] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:21:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 20:21:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r0, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 426.670040] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 426.720483] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x10}, 0x700) 20:21:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x23020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:02 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x0, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:21:02 executing program 4: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x4000, 0x0) 20:21:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 20:21:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r0, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 20:21:02 executing program 4: io_setup(0x6, &(0x7f0000000140)=0x0) io_destroy(r0) io_cancel(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 427.495066] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:21:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 427.548484] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:02 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x0, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:21:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) [ 427.597466] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x23030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 427.789970] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 427.842157] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 427.857936] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x15}, 0x700) 20:21:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, 0x8, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x28}}, 0x0) 20:21:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 20:21:03 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:21:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x24000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 20:21:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x20, 0x16, 0xa, 0x301, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0x48}}, 0x0) 20:21:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 428.421327] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 428.463457] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:03 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) [ 428.518601] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x24010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 428.658975] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 428.674002] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 428.702236] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x18}, 0x700) 20:21:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@can_newroute={0x14c, 0x18, 0x0, 0x0, 0x0, {}, [@CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "4f140af2199ee0d1"}, 0x3}}, @CGW_CS_CRC8={0x11e, 0x6, {0x30, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "6a4c9208085b7ce98bcf50f19a4a4acd67dcc6f7"}}]}, 0x14c}}, 0x0) 20:21:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x4, [@func={0x2, 0x0, 0x0, 0xc, 0x3}, @enum={0x0, 0x0, 0x0, 0x4}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x2, [{}]}]}, {0x0, [0x0, 0x5f]}}, 0x0, 0x48}, 0x20) 20:21:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:04 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:21:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x24020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@can_newroute={0x14c, 0x18, 0x0, 0x0, 0x0, {}, [@CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "4f140af2199ee0d1"}, 0x3}}, @CGW_CS_CRC8={0x11e, 0x6, {0x30, 0x0, 0x0, 0x0, 0x0, "2b0461cfa6bc09f7aca5a3597cc4c70cb56160348b9149305554db7befcbfe73c71247687aed42718dd0fa98f713e910350b9a239298d52beb7f28a15755387e47ed02b73fc71298ce5ccd8e42c409a6ed0779c1d5c7a23251d5da02e138e0c66045f22f2630fea6543141810a17df837078d055264ff3f00859df89b2d45a1bd211ea1b7334bdb662e4256e90e7445f6dc2b78942b483a6296aa5a729fda0ac121686ad9b2e6806b2db9da31dd10d9aacd3701d30207a1fcd7b0aa26720484847daeab0523c120ce41e105943393d34a73e6c9e95b04bfe6eceec1cd1b1896eda5f8ce1bebe6d4aa424a8ba1b87e574656bb66f0b27ca716a4f6ce2e0df1a55", 0x0, "6a4c9208085b7ce98bcf50f19a4a4acd67dcc6f7"}}]}, 0x14c}}, 0x0) 20:21:04 executing program 4: r0 = getpgid(0x0) r1 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000140)=r0) fcntl$getown(r1, 0x9) 20:21:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 429.319796] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:21:04 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) [ 429.371753] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 429.412420] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@can_newroute={0x14c, 0x18, 0x0, 0x0, 0x0, {}, [@CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "4f140af2199ee0d1"}, 0x3}}, @CGW_CS_CRC8={0x11e, 0x6, {0x30, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "6a4c9208085b7ce98bcf50f19a4a4acd67dcc6f7"}}]}, 0x14c}}, 0x0) 20:21:04 executing program 4: r0 = socket$inet(0x2, 0x80001, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000240)={{0x2, 0x0, @dev}, {0x6, @random="e6da33d21e87"}, 0x28, {0x2, 0x0, @broadcast}, 'vlan1\x00'}) 20:21:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x34}, 0x700) 20:21:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x24030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:05 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:21:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@can_newroute={0x2c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "4f140af2199ee0d1"}, 0x3}}]}, 0x2c}}, 0x0) 20:21:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x88a8ffff}, 0x0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:05 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 20:21:05 executing program 4: r0 = socket(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={@loopback, @mcast2, @private2, 0x0, 0x0, 0xaa76}) 20:21:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@can_newroute={0x2c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "4f140af2199ee0d1"}, 0x3}}]}, 0x2c}}, 0x0) 20:21:05 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:21:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x88a8ffff}, 0x0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 430.260050] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 430.291577] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@can_newroute={0x2c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "4f140af2199ee0d1"}, 0x3}}]}, 0x2c}}, 0x0) [ 430.333325] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:05 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/stat\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) dup3(r1, r0, 0x0) 20:21:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x48}, 0x700) 20:21:06 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:21:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x88a8ffff}, 0x0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x25000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:06 executing program 4: r0 = socket(0x1e, 0x1, 0x0) getsockopt(r0, 0x800000010f, 0x81, &(0x7f00004ad000), &(0x7f0000000000)=0xfffffffffffffd8a) 20:21:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@can_newroute={0x14c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "4f140af2199ee0d1"}, 0x3}}, @CGW_CS_CRC8={0x11e, 0x6, {0x0, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "6a4c9208085b7ce98bcf50f19a4a4acd67dcc6f7"}}]}, 0x14c}}, 0x0) 20:21:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) fallocate(r0, 0x79, 0x0, 0x9) 20:21:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x74}, 0x1, 0x88a8ffff}, 0x0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:06 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:21:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@can_newroute={0x14c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "4f140af2199ee0d1"}, 0x3}}, @CGW_CS_CRC8={0x11e, 0x6, {0x0, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "6a4c9208085b7ce98bcf50f19a4a4acd67dcc6f7"}}]}, 0x14c}}, 0x0) [ 431.149453] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 431.164915] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 431.182449] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x25010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:06 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000068c0)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$FUSE_POLL(r0, &(0x7f0000008940)={0x2d}, 0x18) [ 431.410298] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 431.420619] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 431.430605] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xcc}, 0x700) 20:21:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x74}, 0x1, 0x88a8ffff}, 0x0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:07 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:21:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@can_newroute={0x14c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "4f140af2199ee0d1"}, 0x3}}, @CGW_CS_CRC8={0x11e, 0x6, {0x0, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "6a4c9208085b7ce98bcf50f19a4a4acd67dcc6f7"}}]}, 0x14c}}, 0x0) 20:21:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x25020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:07 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec", 0x4) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xfed8}], 0x1}}], 0x1, 0x0, 0x0) 20:21:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@can_newroute={0x134, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_CS_CRC8={0x11e, 0x6, {0x30, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "6a4c9208085b7ce98bcf50f19a4a4acd67dcc6f7"}}]}, 0x134}}, 0x0) 20:21:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x74}, 0x1, 0x88a8ffff}, 0x0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:07 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(0xffffffffffffffff, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) [ 432.079804] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:21:07 executing program 4: pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000240)="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", 0x6a64549958631e6d}, {&(0x7f0000000000)="c7f0f903f0aea5cf71eecc1f8da2a7c7831e66b6f231c6fb29a32228a1df52ae499da3ee662daf80"}, {&(0x7f00000003c0)="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"}], 0x1) 20:21:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@can_newroute={0x134, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_CS_CRC8={0x11e, 0x6, {0x30, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "6a4c9208085b7ce98bcf50f19a4a4acd67dcc6f7"}}]}, 0x134}}, 0x0) [ 432.142485] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 432.168765] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x25030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 432.380123] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 432.389848] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 432.400781] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xcd}, 0x700) 20:21:08 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(0xffffffffffffffff, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:21:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x7a}, [@IFLA_TARGET_NETNSID={0x8}, @IFLA_IFNAME={0x14, 0x3, 'vlan0\x00'}]}, 0x3c}}, 0x0) 20:21:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@can_newroute={0x134, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_CS_CRC8={0x11e, 0x6, {0x30, 0x0, 0x0, 0x0, 0x0, "2b0461cfa6bc09f7aca5a3597cc4c70cb56160348b9149305554db7befcbfe73c71247687aed42718dd0fa98f713e910350b9a239298d52beb7f28a15755387e47ed02b73fc71298ce5ccd8e42c409a6ed0779c1d5c7a23251d5da02e138e0c66045f22f2630fea6543141810a17df837078d055264ff3f00859df89b2d45a1bd211ea1b7334bdb662e4256e90e7445f6dc2b78942b483a6296aa5a729fda0ac121686ad9b2e6806b2db9da31dd10d9aacd3701d30207a1fcd7b0aa26720484847daeab0523c120ce41e105943393d34a73e6c9e95b04bfe6eceec1cd1b1896eda5f8ce1bebe6d4aa424a8ba1b87e574656bb66f0b27ca716a4f6ce2e0df1a55", 0x0, "6a4c9208085b7ce98bcf50f19a4a4acd67dcc6f7"}}]}, 0x134}}, 0x0) 20:21:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x26000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@can_newroute={0x14c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "4f140af2199ee0d1"}}}, @CGW_CS_CRC8={0x11e, 0x6, {0x30, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "6a4c9208085b7ce98bcf50f19a4a4acd67dcc6f7"}}]}, 0x14c}}, 0x0) 20:21:08 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(0xffffffffffffffff, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:21:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 433.037219] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.1'. 20:21:08 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendmmsg$alg(r0, &(0x7f0000001a00)=[{0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=[@assoc={0x18}], 0x18}], 0x3, 0x0) [ 433.101801] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:21:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@can_newroute={0x14c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "4f140af2199ee0d1"}}}, @CGW_CS_CRC8={0x11e, 0x6, {0x30, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "6a4c9208085b7ce98bcf50f19a4a4acd67dcc6f7"}}]}, 0x14c}}, 0x0) 20:21:08 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) [ 433.166364] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 433.195274] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.1'. [ 433.203102] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xd1}, 0x700) 20:21:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x26010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x14, 0x0, &(0x7f0000000080)) 20:21:09 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:21:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@can_newroute={0x14c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_MOD_OR={0x15, 0x2, {{{}, 0x0, 0x0, 0x0, 0x0, "4f140af2199ee0d1"}}}, @CGW_CS_CRC8={0x11e, 0x6, {0x30, 0x0, 0x0, 0x0, 0x0, "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", 0x0, "6a4c9208085b7ce98bcf50f19a4a4acd67dcc6f7"}}]}, 0x14c}}, 0x0) [ 433.917158] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.1'. 20:21:09 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, 0x0, 0x0, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:21:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000400)=@raw={'raw\x00', 0xc01, 0x3, 0x288, 0x100, 0x5002004a, 0x0, 0x0, 0x0, 0x1f0, 0x3c8, 0x3c8, 0x1f0, 0x3c8, 0x3, 0x0, {[{{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x1, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}, {{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x60], 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'vxcan1\x00'}}]}, @common=@inet=@SET1={0x28, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e8) 20:21:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x1000000000000003, 0x29) r2 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xf5) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000200)=ANY=[@ANYBLOB="e0000002ac1414aa000000000200000070"], 0x18) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmsg$inet(r1, &(0x7f0000001640)={&(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10, 0x0}, 0x0) [ 433.983159] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:21:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 434.072103] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 434.111819] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:09 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180), 0x0, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:21:09 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, 0x2d0ceef7b351c590}, 0x90) [ 434.204034] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.1'. 20:21:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xd5}, 0x700) 20:21:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x26020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x1000000000000003, 0x29) r2 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xf5) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000200)=ANY=[@ANYBLOB="e0000002ac1414aa000000000200000070"], 0x18) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmsg$inet(r1, &(0x7f0000001640)={&(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10, 0x0}, 0x0) 20:21:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:10 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180), 0x0, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:21:10 executing program 5: open(&(0x7f00000002c0)='./file0\x00', 0x1100001a1043, 0x0) mount(&(0x7f0000000640)=ANY=[@ANYBLOB=':d]:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) [ 434.893222] libceph: parse_ips bad ip ':d]' 20:21:10 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180), 0x0, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) [ 434.920675] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 434.929231] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.1'. 20:21:10 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x14, 0x2, 0x1, 0xff0b, 0x0, 0x0, {0x2, 0x2}}, 0x14}}, 0x0) 20:21:10 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x800448d2, &(0x7f0000000000)="b4") [ 434.976573] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 435.027479] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:10 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)='!\x00', 0x2, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:21:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x26030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 435.142667] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.1'. [ 435.292660] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 435.327394] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 435.349223] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xf0}, 0x700) 20:21:11 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x3, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfe}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, 0x50}}, 0x0) 20:21:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:11 executing program 5: ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @remote}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, 'veth1\x00'}) r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={r1, @in={{0x2, 0x0, @empty}}}, 0x90) 20:21:11 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)='!\x00', 0x2, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:21:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x27000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:11 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502108, &(0x7f00000001c0)) [ 435.841528] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. 20:21:11 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)='!\x00', 0x2, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:21:11 executing program 5: unshare(0x8000400) r0 = memfd_create(&(0x7f00000000c0)='\x11\x00\xf6\xd3B\xe7\xf0\xae_\v\xb8\x00\x1c\xd8\x8d\xc1$\xfa\xe6\xed0\x15 y\xf9=!&\xfbA\xcc\x19\x95\x10\xcah\xc4vW\xd9z\x88\xf0\xf8\x15H\x87j\xd8\xd2/N\xb9\xab~\x93\xa0)\"\x10\xfc\x981[o\xaf\xd5\xe2vOf\xa0\xf0\xbd-Ed\x02\xbf\xd4\xf7\xe1\"\xc6\x98\x8bK\x8a\x99\x91\xb16\xb9o\xdd\xd3\x12', 0x0) write(r0, 0x0, 0x0) [ 435.903291] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:21:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 435.983549] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 436.014664] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:11 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'tgr192\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000013c0)=[{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000000)="fe", 0x1}, {&(0x7f0000000100)="d37168c3e1d7bb6a7609d56caf7893d4610b2b4c9617afa0fadea75f03052e821d07fa856a58186fb165ee45e6f2a3b0d273fc84c2b1bdafde3a7a7ada92d5", 0x3f}], 0x2}], 0x1, 0x0) 20:21:11 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)='!\x00\x00', 0x3, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) [ 436.092816] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. 20:21:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xf1}, 0x700) 20:21:11 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000080)={0xa}) 20:21:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x27010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:11 executing program 4: 20:21:11 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)='!\x00\x00', 0x3, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:21:12 executing program 4: 20:21:12 executing program 5: [ 436.731483] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 436.739895] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.1'. [ 436.767070] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:12 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)='!\x00\x00', 0x3, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:21:12 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c000580"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 436.798930] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:12 executing program 4: 20:21:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xd1}, 0x700) [ 436.882111] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.1'. 20:21:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xf4}, 0x700) 20:21:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x27020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:12 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x15}, 0x700) 20:21:12 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0x4, 0x0, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:21:12 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c000580"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:12 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c000580"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:12 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0x4, 0x0, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) [ 437.668184] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 437.724485] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:13 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0x4, 0x0, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:21:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xd1}, 0x700) [ 437.772303] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c000580050019000200"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x27030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:13 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0x4, 0x4008000, 0x0, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) [ 437.931344] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 437.955592] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 437.981518] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:13 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xd1}, 0x700) 20:21:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c000580050019000200"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:13 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0x4, 0x4008000, 0x0, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:21:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x28000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xf6}, 0x700) 20:21:13 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x24010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:13 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0x4, 0x4008000, 0x0, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) [ 438.533846] nla_parse: 3 callbacks suppressed [ 438.533856] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.1'. [ 438.553805] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 438.563543] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 438.599779] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 438.609674] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 438.630223] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c000580050019000200"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:13 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) [ 438.658143] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 20:21:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x28010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:14 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:21:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x4}, 0x700) [ 438.752436] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.1'. [ 438.848345] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 438.861899] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 438.879756] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) setsockopt$sock_int(r2, 0x1, 0x22, &(0x7f0000000040)=0xffff, 0x4) r3 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x20002) r4 = dup(r3) write$6lowpan_enable(r4, &(0x7f0000000000)='0', 0xfffffd2c) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000080)={0x2, {0x2, 0x1, 0x5, 0x1, 0x6, 0x4}}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r5 = dup(r2) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x20002) r7 = dup(r6) write$6lowpan_enable(r7, &(0x7f0000000000)='0', 0xfffffd2c) ioctl$USBDEVFS_GET_CAPABILITIES(r7, 0x8004551a, &(0x7f0000000140)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text16={0x10, &(0x7f00000000c0)="ba2100ecbaf80c66b8cca84e8b66efbafc0c66edf30fc735ba4000b80080efbaf80c66b830c2c48566efbafc0c66ed66d8f7260f23d1262e0faef6ba400066edf2e30b"}], 0xaaaaaaaaaaaadc9, 0x14, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:21:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c000580050019000200000005"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:14 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:21:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x28020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xfe}, 0x700) [ 439.401113] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 439.418151] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. 20:21:14 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) [ 439.453368] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c000580050019000200000005"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 439.568006] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 439.612371] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. 20:21:14 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:21:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x28030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:15 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0xd0800e0}, 0x6e) 20:21:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c000580050019000200000005"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:15 executing program 4: socket$pppoe(0x18, 0x1, 0x0) socketpair(0x18, 0x0, 0x0, &(0x7f0000000300)) [ 440.289836] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 440.428489] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 440.541952] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000000)="0fae570d0deece85e5d4360f0ff3b63ef0fe4e00ba420066ed66b891d7e4700f23c00f21f8663503000a000f23f80f060f30", 0xfffffffffffffd68}], 0x1, 0x14, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:21:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c00058005001900020000000500"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:16 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:21:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x106}, 0x700) 20:21:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000000)="0fae570d0deece85e5d4360f0ff3b63ef0fe4e00ba420066ed66b891d7e4700f23c00f21f8663503000a000f23f80f060f30", 0xfffffffffffffd68}], 0x1, 0x14, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:21:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x29000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 440.897550] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. 20:21:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c00058005001900020000000500"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:16 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 441.007010] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 441.042037] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:16 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 441.093722] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 441.111782] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. 20:21:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x29010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:16 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e) 20:21:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c00058005001900020000000500"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@text32={0x20, &(0x7f0000000040)="b9c50300000f3266ba4200ec660f7db80008000066b8d7008ec866baf80cb83c189a87ef66bafc0cec3e0f23c76664d03f6736670f01c566660fc732c4c194c214f824", 0x43}], 0x1, 0x6b, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000000)="0fae570d0deece85e5d4360f0ff3b63ef0fe4e00ba420066ed66b891d7e4700f23c00f21f8663503000a000f23f80f060f30", 0xfffffffffffffd68}], 0x1, 0x14, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:21:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@text32={0x20, &(0x7f0000000040)="b9c50300000f3266ba4200ec660f7db80008000066b8d7008ec866baf80cb83c189a87ef66bafc0cec3e0f23c76664d03f6736670f01c566660fc732c4c194c214f824", 0x43}], 0x1, 0x6b, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000000)="0fae570d0deece85e5d4360f0ff3b63ef0fe4e00ba420066ed66b891d7e4700f23c00f21f8663503000a000f23f80f060f30", 0xfffffffffffffd68}], 0x1, 0x14, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 441.288425] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 441.310803] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 441.329208] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x29020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 441.364928] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. [ 441.562295] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 441.595377] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 441.612590] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x162}, 0x700) 20:21:17 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e) 20:21:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000000)="0fae570d0deece85e5d4360f0ff3b63ef0fe4e00ba420066ed66b891d7e4700f23c00f21f8663503000a000f23f80f060f30", 0xfffffffffffffd68}], 0x1, 0x14, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:21:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x29030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r3 = dup(r2) lsetxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x1) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000000)="0fae570d0deece85e5d4360f0ff3b63ef0fe4e00ba420066ed66b891d7e4700f23c00f21f8663503000a000f23f80f060f30", 0xfffffffffffffd68}], 0x1, 0x14, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 441.819151] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 441.844243] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 441.872910] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 441.904810] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:21:17 executing program 3: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002300)=ANY=[@ANYRES64], 0x8) r0 = socket(0x2, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0)='bridge0\x00', 0x10) sendto$unix(r0, &(0x7f0000000180)="210000d9", 0xff25, 0x4008000, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e) [ 441.938570] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2a000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:17 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x7, 0x4, 0x100, 0xf1a, 0x20}, 0x40) [ 442.120216] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 442.160791] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:21:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:17 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x3af4701e) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x28012, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) [ 442.214285] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 442.272840] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 442.318774] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 442.346007] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 442.356915] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:21:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x170}, 0x700) 20:21:17 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000100)={0x2020}, 0x2020) 20:21:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2a010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:17 executing program 4: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self\x00', 0x557682, 0x0) 20:21:17 executing program 5: r0 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r0, r1, 0xffffffffffffffff, 0x0) 20:21:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:18 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2201, 0x0) [ 442.741474] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 442.770566] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r1 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 442.812733] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:18 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$UI_DEV_CREATE(r2, 0x5501) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) fsetxattr(r3, &(0x7f0000000100)=@known='security.apparmor\x00', &(0x7f0000000140)='/@.\\:K}\x00', 0x8, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r4 = dup(r2) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000000)="0fae570d0deece85e5d4360f0ff3b63ef0fe4e00ba420066ed66b891d7e4700f23c00f21f8663503000a000f23f80f060f30", 0xfffffffffffffd68}], 0x1, 0x14, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0xffffffffffffffc0, &(0x7f0000ffd000/0x3000)=nil, 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:21:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2a020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$UI_DEV_CREATE(r2, 0x5501) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) fsetxattr(r3, &(0x7f0000000100)=@known='security.apparmor\x00', &(0x7f0000000140)='/@.\\:K}\x00', 0x8, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r4 = dup(r2) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000000)="0fae570d0deece85e5d4360f0ff3b63ef0fe4e00ba420066ed66b891d7e4700f23c00f21f8663503000a000f23f80f060f30", 0xfffffffffffffd68}], 0x1, 0x14, 0x0, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0xffffffffffffffc0, &(0x7f0000ffd000/0x3000)=nil, 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 442.980574] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 443.035500] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 443.065537] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x174}, 0x700) 20:21:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2a030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:18 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r3 = dup(r2) r4 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0x100, r4, 0x10, 0x70bd27, 0x25dfdbfe, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xa23}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xffffffff}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x10000}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7fffffff}}]}, 0x100}, 0x1, 0x0, 0x0, 0x40000}, 0x1) sendmsg$DEVLINK_CMD_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r4, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}]}, 0x30}, 0x1, 0x0, 0x0, 0x28000010}, 0x2) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xb) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000000)="0fae570d0deece85e5d4360f0ff3b63ef0fe4e00ba420066ed66b891d7e4700f23c00f21f8663503000a000f23f80f060f30", 0xfffffffffffffd68}], 0x1, 0x14, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r5 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x20002) r6 = dup(r5) write$6lowpan_enable(r6, &(0x7f0000000000)='0', 0xfffffd2c) ioctl$SNDRV_PCM_IOCTL_PAUSE(r6, 0x40044145, &(0x7f0000000040)) 20:21:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r3 = dup(r2) r4 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0x100, r4, 0x10, 0x70bd27, 0x25dfdbfe, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xa23}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xffffffff}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x10000}}, {@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x7fffffff}}]}, 0x100}, 0x1, 0x0, 0x0, 0x40000}, 0x1) sendmsg$DEVLINK_CMD_GET(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r4, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}]}, 0x30}, 0x1, 0x0, 0x0, 0x28000010}, 0x2) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xb) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000000)="0fae570d0deece85e5d4360f0ff3b63ef0fe4e00ba420066ed66b891d7e4700f23c00f21f8663503000a000f23f80f060f30", 0xfffffffffffffd68}], 0x1, 0x14, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r5 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x20002) r6 = dup(r5) write$6lowpan_enable(r6, &(0x7f0000000000)='0', 0xfffffd2c) ioctl$SNDRV_PCM_IOCTL_PAUSE(r6, 0x40044145, &(0x7f0000000040)) [ 443.594965] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 443.619008] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30024 comm=syz-executor.1 [ 443.641366] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 443.683231] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2b000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 444.063914] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30042 comm=syz-executor.1 20:21:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 444.395179] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 444.572939] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x191}, 0x700) 20:21:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x174}, 0x700) [ 444.689339] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30059 comm=syz-executor.1 [ 444.703503] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x174}, 0x700) 20:21:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2b010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 444.821460] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30069 comm=syz-executor.1 20:21:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 444.880862] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30076 comm=syz-executor.1 20:21:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="74000000100001040000", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 444.939238] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 444.949672] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 444.965310] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30086 comm=syz-executor.1 [ 444.981283] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2b020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 445.044444] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.1'. 20:21:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="74000000100001040000", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 445.178254] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 445.193231] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 445.218973] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 445.222945] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.1'. 20:21:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="74000000100001040000", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2b030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 445.349637] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.1'. [ 445.378208] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 445.387745] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 445.399261] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x1b8}, 0x700) 20:21:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff00", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x20000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r3 = dup(r2) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r3, 0x800442d3, &(0x7f0000000380)={0x88, 0x4, 0x3f, @local, 'bond0\x00'}) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x20002) r5 = syz_mount_image$affs(&(0x7f0000000080)='affs\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="b7d890c19a2f0999b9d7ced94559ed425940c9da673173d286e85cd5882a583f43", 0x21, 0x7}, {&(0x7f0000000180)="b4889eac976be96f9d1301fd9b223a33581c78d7c076f2eecdd4dcb866d19582a2ef47a393b8c1d85e6b05af4af079d7e1f83f99b0b72a7f928747533a88b60f180898e70929107cf1537b5223de7a568c6ee3b9b346215603f89def2070078e6addd6c20dd09457ed82ffaccc0018bbe0b00b3f7b48a8", 0x77}], 0x142002, &(0x7f0000000300)={[{'\\'}, {'%})]}'}, {'[\''}, {'}/[*:'}, {','}, {'{[\'#$/:@.}[\''}, {'/dev/snd/midiC#D#\x00'}, {'/dev/kvm\x00'}], [{@smackfsroot={'smackfsroot', 0x3d, '/dev/snd/midiC#D#\x00'}}]}) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r5, 0x40089413, &(0x7f0000000280)=0xfa) r6 = dup(r4) write$6lowpan_enable(r6, &(0x7f0000000000)='0', 0xfffffd2c) ioctl$VIDIOC_ENUMAUDOUT(r6, 0xc0345642, &(0x7f0000000040)={0x1, "b02ec1a02ec18e6cad25fab37b630b70db678313336b189990dba4acc627c615", 0x1}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000000)="0fae570d0deece85e5d4360f0ff3b63ef0fe4e00ba420066ed66b891d7e4700f23c00f21f8663503000a000f23f80f060f30", 0xfffffffffffffd68}], 0x1, 0x14, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:21:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2c000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:20 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.current\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x8000000000000) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r4 = dup(r3) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000000)="0fae570d0deece85e5d4360f0ff3b63ef0fe4e00ba420066ed66b891d7e4700f23c00f21f8663503000a000f23f80f060f30", 0xfffffffffffffd68}], 0x1, 0x14, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$VHOST_NET_SET_BACKEND(r5, 0x4008af30, &(0x7f0000000080)={0x3, r4}) [ 445.670199] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.1'. 20:21:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff00", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 445.723566] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 445.800828] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 445.829376] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 445.881272] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.1'. 20:21:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2c010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) connect$pppl2tp(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @loopback}, 0x1, 0x2, 0x4, 0x2}}, 0x2e) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r4 = dup(r3) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000000)="0fae570d0deece85e5d4360f0ff3b63ef0fe4e00ba420066ed66b891d7e4700f23c00f21f8663503000a000f23f80f060f30", 0xfffffffffffffd68}], 0x1, 0x14, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 20:21:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff00", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 446.148539] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 446.188956] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.1'. [ 446.237184] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 446.332599] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2c020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x1be}, 0x700) 20:21:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x1b8}, 0x700) [ 446.623054] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.1'. 20:21:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r3 = dup(r2) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000000)="0fae570d0deece85e5d4360f0ff3b63ef0fe4e00ba420066ed66b891d7e4700f23c00f21f8663503000a000f23f80f060f30", 0xfffffffffffffd68}], 0x1, 0x14, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:21:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 446.711735] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 446.730379] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 446.748127] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2c030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 446.808596] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.1'. 20:21:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 446.931975] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.1'. [ 446.986674] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 447.002653] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x44, r2, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x9}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x40040) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r4 = dup(r3) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000000)="0fae570d0deece85e5d4360f0ff3b63ef0fe4e00ba420066ed66b891d7e4700f23c00f21f8663503000a000f23f80f060f30", 0xfffffffffffffd68}], 0x1, 0x14, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 447.035148] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 447.057010] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.1'. 20:21:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2d000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x0, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 447.231280] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 447.248061] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 447.264274] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x1ca}, 0x700) 20:21:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f0000000000)="0fae570d0deece85e5d4360f0ff3b63ef0fe4e00ba420066ed66b891d7e4700f23c00f21f8663503000a000f23f80f060f30", 0x32}], 0x1, 0x14, 0x0, 0x0) r4 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x20002) r5 = dup(r4) write$6lowpan_enable(r5, &(0x7f0000000000)='0', 0xfffffd2c) ioctl$TIOCL_SETVESABLANK(r5, 0x541c, &(0x7f00000000c0)) r6 = dup2(r3, r3) ioctl$TIOCSWINSZ(r6, 0x5414, &(0x7f0000000080)={0xc9, 0x93, 0x7, 0x2}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 20:21:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2d010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x0, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f0000000000)="0fae570d0deece85e5d4360f0ff3b63ef0fe4e00ba420066ed66b891d7e4700f23c00f21f8663503000a000f23f80f060f30", 0x32}], 0x1, 0x14, 0x0, 0x0) r4 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x20002) r5 = dup(r4) write$6lowpan_enable(r5, &(0x7f0000000000)='0', 0xfffffd2c) ioctl$TIOCL_SETVESABLANK(r5, 0x541c, &(0x7f00000000c0)) r6 = dup2(r3, r3) ioctl$TIOCSWINSZ(r6, 0x5414, &(0x7f0000000080)={0xc9, 0x93, 0x7, 0x2}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 447.610486] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 447.633917] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 447.655724] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x0, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2d020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2d030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2e000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f0000000000)="0fae570d0deece85e5d4360f0ff3b63ef0fe4e00ba420066ed66b891d7e4700f23c00f21f8663503000a000f23f80f060f30", 0x32}], 0x1, 0x14, 0x0, 0x0) r4 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x20002) r5 = dup(r4) write$6lowpan_enable(r5, &(0x7f0000000000)='0', 0xfffffd2c) ioctl$TIOCL_SETVESABLANK(r5, 0x541c, &(0x7f00000000c0)) r6 = dup2(r3, r3) ioctl$TIOCSWINSZ(r6, 0x5414, &(0x7f0000000080)={0xc9, 0x93, 0x7, 0x2}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 448.353050] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 448.507339] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 448.517923] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x1e7}, 0x700) 20:21:23 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000000000)='.\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000004240)={{}, {0x10}}, 0x24, 0x0) 20:21:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2e010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:23 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0x1c}, [@ldst={0x6, 0x3}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xad], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000080), 0xfffffffffffffffb}, 0x48) [ 448.842097] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:21:24 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0xfffffffffffffdd2) 20:21:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) socket(0x10, 0x8000000000000003, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x40000000000024a, 0x0) [ 448.920722] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 448.954509] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:24 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x24, 0x0, &(0x7f00000000c0)) 20:21:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2e020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:24 executing program 4: r0 = socket$pptp(0x18, 0x1, 0x2) sendmmsg$inet(r0, &(0x7f0000000080)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 20:21:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) socket(0x10, 0x8000000000000003, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) r3 = dup(r2) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, &(0x7f0000000000)="0fae570d0deece85e5d4360f0ff3b63ef0fe4e00ba420066ed66b891d7e4700f23c00f21f8663503000a000f23f80f060f30", 0x32}], 0x1, 0x14, 0x0, 0x0) r4 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x20002) r5 = dup(r4) write$6lowpan_enable(r5, &(0x7f0000000000)='0', 0xfffffd2c) ioctl$TIOCL_SETVESABLANK(r5, 0x541c, &(0x7f00000000c0)) r6 = dup2(r3, r3) ioctl$TIOCSWINSZ(r6, 0x5414, &(0x7f0000000080)={0xc9, 0x93, 0x7, 0x2}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 449.341516] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 449.376170] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 449.387469] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x1ed}, 0x700) 20:21:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000140)={0x0, 0x5b, &(0x7f0000000100)={&(0x7f00000006c0)={0xa4, r1, 0x409, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_PEERS={0x74, 0x8, 0x0, 0x1, [{0xfffffffffffffd7e, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg='\xdb\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff'}, @WGPEER_A_ALLOWEDIPS={0x48, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}]}]}]}, @WGDEVICE_A_FLAGS={0x8}]}, 0xa4}}, 0x0) 20:21:24 executing program 4: r0 = socket$inet_sctp(0xa, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000002bc0)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @local, 0xa}, 0x1c, &(0x7f0000001200)=[{&(0x7f0000000080)="a1", 0x1}], 0x1}], 0x1, 0xfc) 20:21:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) socket(0x10, 0x8000000000000003, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x40000000000024a, 0x0) 20:21:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2e030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) [ 449.786484] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 449.880656] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:25 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/193, 0xc1}], 0x1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x76, &(0x7f0000000300)={r2}, &(0x7f0000000340)=0x10) 20:21:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000580)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ip6gre={{0xb, 0x1, 'ip6gre\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_IFLAGS={0x6, 0x2, 0xffff}]}}}]}, 0x3c}}, 0x0) [ 449.950057] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) 20:21:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2f000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:25 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000002dc0)=@newqdisc={0x48, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x54a}, @qdisc_kind_options=@q_pfifo_head_drop={{0x14, 0x1, 'pfifo_head_drop\x00'}, {0x8}}]}, 0x48}}, 0x0) 20:21:25 executing program 3: mmap$xdp(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3000004, 0x6c032, 0xffffffffffffffff, 0x180000000) [ 450.409174] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 450.454817] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 450.470382] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x1f4}, 0x700) 20:21:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=@newtaction={0x58, 0x30, 0x727, 0x0, 0x0, {}, [{0x44, 0x1, [@m_ct={0x40, 0x1, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}, @TCA_CT_LABELS={0x14, 0x7, "21a442d605799ce18e51f600eb73f08f"}]}, {0x4}}}]}]}, 0x58}}, 0x0) 20:21:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="7400000010000104000000ffffff000000ad58c6", @ANYRES32=r1, @ANYBLOB="0000000000000c2054001280110001cfd7725aad329dffff000076abf3a188023c0005800500190002000000050001"], 0x74}, 0x1, 0x88a8ffff}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) 20:21:25 executing program 4: r0 = socket(0x2b, 0x1, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x6, 0x1d, &(0x7f0000000040), 0x4) 20:21:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2f010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:25 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x80000003, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85513, &(0x7f0000000080)={{0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}) 20:21:25 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) preadv(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f0000000180)=""/4082, 0xff2}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x218, 0x0, 0x0) 20:21:25 executing program 5: r0 = socket(0xa, 0x6, 0x0) bind$l2tp6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x20) connect$l2tp6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x20) 20:21:26 executing program 4: r0 = socket$inet(0x2, 0x5, 0x0) getsockopt$inet_mreqn(r0, 0x84, 0x10, 0x0, &(0x7f0000000040)=0x8) [ 450.730824] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 450.773441] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:26 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x1) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x33, 0x0, &(0x7f0000000080)) [ 450.821429] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2f020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:26 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) [ 450.887849] sctp: [Deprecated]: syz-executor.4 (pid 30417) Use of struct sctp_assoc_value in delayed_ack socket option. [ 450.887849] Use struct sctp_sack_info instead [ 450.921149] audit: type=1400 audit(1603311686.151:36): avc: denied { set_context_mgr } for pid=30410 comm="syz-executor.3" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=binder permissive=1 [ 451.055261] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 451.094146] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 451.120766] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x22a}, 0x700) 20:21:26 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000080)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x22, &(0x7f0000356000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='veth1_virt_wifi\x00', 0x10) sendmmsg(r1, &(0x7f0000006b00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 20:21:26 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x145940, 0x0) 20:21:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=@newlink={0x2c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_VFINFO_LIST={0x4}]}, 0x2c}}, 0x0) 20:21:26 executing program 5: bpf$MAP_CREATE(0x900000000000000, &(0x7f0000001540)={0x14, 0x4, 0x200000004, 0x9, 0x4, 0xffffffffffffffff, 0x0, [0x302e, 0x2e, 0x5f, 0x80ffff, 0x5f, 0x2e, 0x80ffff, 0x2e, 0x2e, 0x2e, 0x80ffff, 0x5f, 0x48, 0x2e, 0x2e]}, 0x40) 20:21:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2f030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:26 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@mcast2}, {@in=@remote, 0x0, 0x32}, @in=@dev, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x1, 0x0, 0x0, @in=@local}}]}, 0x154}}, 0x0) [ 451.584229] audit: type=1800 audit(1603311686.811:37): pid=30443 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="ppp" dev="sda1" ino=17455 res=0 20:21:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000600)='gtp\x00') sendmsg$GTP_CMD_GETPDP(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@GTPA_VERSION={0x8}]}, 0x1c}}, 0x0) [ 451.658408] audit: type=1800 audit(1603311686.811:38): pid=30443 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.1" name="ppp" dev="sda1" ino=17455 res=0 20:21:26 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xe) [ 451.710884] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 451.717421] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 451.749848] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:27 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x14, 0x4, 0x8, 0x80000f18}, 0x40) 20:21:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array]}}, &(0x7f0000000100)=""/140, 0x32, 0x8c, 0x8}, 0x20) [ 451.772281] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 451.777504] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 20:21:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x30000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 451.831518] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 452.025272] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 452.038723] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 452.051736] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x240}, 0x700) 20:21:27 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xe) 20:21:27 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) 20:21:27 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/timer\x00', 0x0, 0x0) read$proc_mixer(r0, 0x0, 0x0) 20:21:27 executing program 5: r0 = syz_open_dev$video4linux(&(0x7f00000001c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc0585605, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x7, 0x8000000}}) 20:21:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x30010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:27 executing program 5: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x82, 0x0, 0x0) [ 452.627180] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 452.667107] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:27 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000001200)=ANY=[@ANYBLOB="1b3e"], 0x6dd) 20:21:27 executing program 1: syz_mount_image$gfs2(&(0x7f0000000340)='gfs2\x00', &(0x7f0000000380)='./file1\x00', 0x0, 0x0, &(0x7f00000007c0), 0x0, &(0x7f0000000080)={[{@statfs_percent={'statfs_percent', 0x3d, 0x68}}]}) 20:21:27 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) [ 452.701713] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:28 executing program 5: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) 20:21:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x30020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 452.919608] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 452.929719] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 452.941075] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x28c}, 0x700) 20:21:28 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) 20:21:28 executing program 1: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x49, 0x0, 0x0) 20:21:28 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000300)=@newlink={0x48, 0x10, 0xc3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @erspan={{0xb, 0x1, 'erspan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_GRE_ENCAP_DPORT={0x6}, @IFLA_GRE_ENCAP_SPORT={0x6}, @IFLA_GRE_COLLECT_METADATA={0x4}]}}}]}, 0x48}}, 0x0) 20:21:28 executing program 5: r0 = socket(0x15, 0x80005, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2b}}}, 0x1c) 20:21:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x30030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:28 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) 20:21:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000000)=@framed={{0x11, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0xc}, [@func, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) 20:21:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000440)='devlink\x00') sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x44, r1, 0xce5c5bfd2a2fba67, 0x0, 0x0, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}}]}, 0x44}}, 0x0) [ 453.555807] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:21:28 executing program 5: r0 = socket(0x25, 0x5, 0x0) accept4$inet6(r0, 0x0, 0xfffffffffffffffd, 0x0) 20:21:28 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) 20:21:28 executing program 1: syz_emit_ethernet(0x26, &(0x7f0000000040)={@local, @dev, @void, {@ipv4={0x800, @generic={{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp={0x7, 0x4, 0x4, 0x3}]}}}}}}, 0x0) [ 453.604910] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 453.632576] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:29 executing program 5: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000002940)={&(0x7f0000000340)=@newtaction={0x18, 0x31, 0x53b, 0x0, 0x0, {}, [{0x4}]}, 0x18}}, 0x0) 20:21:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x31000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:29 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) 20:21:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(r3, r1, r1) setresuid(0x0, 0x0, 0x0) 20:21:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0xfa04, 0x0) 20:21:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x2dc}, 0x700) [ 454.494591] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:21:29 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc000000000}) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) 20:21:29 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) 20:21:29 executing program 5: r0 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000080)) [ 454.538131] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:29 executing program 1: eventfd2(0x0, 0x803) [ 454.609713] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x31010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:29 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) 20:21:29 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454d9, &(0x7f0000000000)) 20:21:29 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 20:21:30 executing program 4: r0 = socket(0x20000000000000a, 0x2, 0x0) connect$inet6(r0, &(0x7f000004bfe4)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000000040)=""/18, &(0x7f0000000080)=0x12) 20:21:30 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) 20:21:30 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000040)="c9127855ab30a2feba94ff1e51e4851c4f0f3b3295733a2ea51d498a3621649737fe8d122df19f16fdb78e38e04024c1d0a20d9e6f8b8eb60ff1aeb553121994c3a79e61e11b675b06", 0x49}, {&(0x7f0000000200)="fc258d5ae342ac0ad94a2707f07305a275421da9354aa0759fc46c5905028049f01d42cfb6e68ae91ca075449a36ad9e4562ccf77a9159", 0x37}], 0x2, 0x0) [ 454.918355] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 454.944549] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 454.968305] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x300}, 0x700) 20:21:30 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc0045516, &(0x7f0000000040)={{0xfdfdffff, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) 20:21:30 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) 20:21:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x31020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:30 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f000001dc00)={0x1b, 0x0, 0x0, 0x2000}, 0x40) readv(r0, &(0x7f0000000b80)=[{&(0x7f0000000180)=""/85, 0x55}], 0x1) 20:21:30 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000002c0)={'batadv_slave_0\x00', 0x0}) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)={0x2c, r2, 0x201, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r4}, @BATADV_ATTR_ELP_INTERVAL={0x8}]}, 0x2c}}, 0x0) 20:21:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(cast6)\x00'}, 0x58) 20:21:30 executing program 4: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = memfd_create(&(0x7f0000000140)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac', 0x0) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) 20:21:30 executing program 3: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) 20:21:30 executing program 1: r0 = socket(0x18, 0x0, 0x0) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000000)) [ 455.500747] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:21:30 executing program 3: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) [ 455.576681] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 455.611216] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x31030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 455.809241] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 455.820022] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 455.831342] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x383}, 0x700) 20:21:31 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6}, 0xd8) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x49, 0x0, "483e28e38bba0b82be102eed7ace2dd5d04c4b666cf6d1a43598dcf1eef9218d8f41a6e99959f7cd9f7a6aea2e9839214e07000000000000000000000000080000000000000000000100"}, 0xd8) 20:21:31 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45528d", 0xa, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000001c0)={[{@iocharset={'iocharset', 0x3d, 'cp855'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 20:21:31 executing program 3: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) 20:21:31 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x8008af26, &(0x7f0000000dc0)) 20:21:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x32000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:31 executing program 3: r0 = socket(0x0, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) [ 456.351700] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 456.386370] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:31 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000dc0)={0x8, 0x0, [{0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}]}) 20:21:31 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000800)=@mangle={'mangle\x00', 0x64, 0x6, 0x7a0, 0xd0, 0x510, 0xd0, 0x510, 0x0, 0x6d0, 0x6d0, 0x6d0, 0x6d0, 0x6d0, 0x6, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00', 0x0, {0x3}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@remote, @ipv4=@multicast1}}}, {{@uncond, 0x0, 0x300, 0x328, 0x0, {}, [@common=@unspec=@bpf0={{0x230, 'bpf\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@rand_addr=' \x01\x00', @ipv4={[], [], @remote}, [], [], 'hsr0\x00', 'veth1_to_batadv\x00'}, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@remote, @ipv6=@mcast1}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28, 'HL\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x800) 20:21:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) r1 = socket(0x40000000002, 0x3, 0x2) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x8980, 0x0) [ 456.497611] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:31 executing program 3: r0 = socket(0x0, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) 20:21:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x32010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 456.611681] xt_CHECKSUM: unsupported CHECKSUM operation 3 [ 456.770113] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 456.784254] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 456.796084] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x3e8}, 0x700) 20:21:32 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x101002, 0x0) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) pwritev(r1, &(0x7f0000000400)=[{&(0x7f0000000380)="a8", 0xffffff5b}], 0x1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x102002700) 20:21:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000640)=0xd3, 0x4) writev(r0, &(0x7f0000003280)=[{&(0x7f0000000000)="580000001400192340834b80043f679a10ff3d425f9cc3f4ff7f4e32f61bcdf1e422006000000100804824cabecc4b381eaadc28f23457e792945f64009400050028925aaa000000c600000000000000feff2c707f8f00ff", 0x58}], 0x1) 20:21:32 executing program 1: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) munlockall() 20:21:32 executing program 3: r0 = socket(0x0, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) 20:21:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x32020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 457.272469] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:21:32 executing program 3: r0 = socket(0x840000000002, 0x0, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) [ 457.315040] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:32 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000002c0)={[], 0x0, 0x4, 0xfffffff7}) [ 457.380356] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x32030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=@newlink={0x3c, 0x10, 0x581, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_UPDELAY={0x8, 0x4, 0xffffffff}]}}}]}, 0x3c}}, 0x0) 20:21:32 executing program 3: r0 = socket(0x840000000002, 0x0, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) [ 457.657516] (unnamed net_device) (uninitialized): option updelay: invalid value (18446744073709551615) [ 457.688034] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 457.702635] (unnamed net_device) (uninitialized): option updelay: allowed values 0 - 2147483647 20:21:33 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) close(r0) [ 457.731673] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 457.777302] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x45e}, 0x700) 20:21:33 executing program 4: pipe2(&(0x7f00000003c0), 0x0) get_mempolicy(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000ff3000/0xc000)=nil, 0x2) 20:21:33 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x5}, 0x1c) sendmsg$inet6(r0, &(0x7f00000008c0)={&(0x7f0000000180)={0xa, 0x0, 0x5, @local, 0x7}, 0x1c, &(0x7f0000000780)=[{&(0x7f0000000340)="f9", 0x26c59}], 0x2f4, 0x0, 0x0, 0x900}, 0x60) 20:21:33 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) waitid$P_PIDFD(0x2, r0, 0x0, 0x2, 0x0) 20:21:33 executing program 3: r0 = socket(0x840000000002, 0x0, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) 20:21:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x33000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 458.175807] Dead loop on virtual device ip6_vti0, fix it urgently! 20:21:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000180)='batadv\x00') sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000040)={0x24, r3, 0xf, 0x0, 0x0, {0xf}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_ORIG_INTERVAL={0x8}]}, 0x24}}, 0x0) 20:21:33 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_mreq(r0, 0x84, 0x19, &(0x7f0000000380)={@empty=0x1000000}, 0x8) [ 458.224844] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:21:33 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x5452, &(0x7f0000000080)={0x0, 0xfc, 0x0, 0x0, "c3cfbc3866811926f8aa98a2667b1a7e8d4ef21b34a1924afb4a1b00"}) [ 458.297123] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:33 executing program 3: r0 = socket(0x840000000002, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) 20:21:33 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0xfffffffc, 0x0, 0x91}, 0x9c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x118a8, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 458.339627] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x33010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 458.558178] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 458.572964] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 458.591141] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x500}, 0x700) 20:21:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'veth1_to_team\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x2b, 0x0, 0x0, "85335d848691"}}) 20:21:34 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x48) r2 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r2, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r2, r1}) sendmsg$inet(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000280)="04", 0x140000}], 0x1, 0x0, 0x0, 0x2}, 0x0) 20:21:34 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000080)={@broadcast, @remote, @val={@void}, {@ipv4={0x800, @udp={{0x5, 0x4, 0x2, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast}, {0x0, 0x883e, 0x10, 0x0, @gue={{0x2}}}}}}}, 0x0) 20:21:34 executing program 3: r0 = socket(0x840000000002, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) 20:21:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x33020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 459.117974] ip_tunnel: non-ECT from 172.30.0.2 with TOS=0x2 [ 459.152481] ip_tunnel: non-ECT from 172.30.0.2 with TOS=0x2 [ 459.163151] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:21:34 executing program 4: socket$inet6_sctp(0xa, 0x5, 0x84) readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/193, 0xc1}], 0x1) socket$inet_sctp(0x2, 0x1, 0x84) r0 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x2812, r0, 0x0) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000040)=ANY=[@ANYRES64], 0xfd30) r1 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0, 0x2812, r1, 0x0) setuid(0x0) mount$9p_virtio(&(0x7f00000002c0)='syz\x00', &(0x7f0000000380)='./bus\x00', &(0x7f00000003c0)='9p\x00', 0x8000, &(0x7f0000000400)={'trans=virtio,', {[{@access_user='access=user'}], [{@uid_lt={'uid<'}}]}}) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYRES64, @ANYRESOCT, @ANYBLOB="203cbd1c1c06b331e6fe"], 0xfd30) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000080)=@assoc_value, &(0x7f0000000200)=0x8) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x5743a2a3502a0d87, 0x0) 20:21:34 executing program 1: prctl$PR_SET_TIMERSLACK(0x1d, 0xfffffffffffffff8) r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x100, 0x0, 0x0) 20:21:34 executing program 3: r0 = socket(0x840000000002, 0x3, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) [ 459.199746] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:34 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x4) syz_emit_ethernet(0x4a, &(0x7f0000000380)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xc2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000400)={@local, @remote, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x11}}}}}}}, 0x0) [ 459.269383] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x33030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 459.334251] 9pnet_virtio: no channels available for device syz [ 459.362347] 9pnet_virtio: no channels available for device syz 20:21:34 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) [ 459.521195] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 459.567502] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 459.581460] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x601}, 0x700) 20:21:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, 0x0, 0x89, 0xb6, 0xffffffff}, 0x20) 20:21:35 executing program 5: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x49f) close(r0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000880)=[&(0x7f0000000a40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[xS\rO\x880\xf1P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac%~\x12\x7ft\xa9\v\xae\x9c\xf3\xb0\xb9\t\x8d\xb9p\xcb\xe3csR\xe2\xfbL\x9f\xb3\xa4^\xc1\xf7m0\xa8\xfd\xcf\xfdY\\d\x03(\x89\xe7\xe1\xcf\xa4m3SQc\xbaG\xcd\xce\xf5o@\xfdi\xd1w~\xc8\xb9\\\a\xeba\x18\x95\x94\xea\xd4\xe8\xcaP\x89\x9b\x12\xa7\xdb\x95c=\x16\xd5\x06\xf9O\x87\x02\xcd\xa4\xc0\xa17\x92]_\xa2>\xbb\xc8?\x98\xa6+\xcf^\xa0\xe8\x9a\x9e>O\xbf\xd3Fd\xfe\x9c|0\xdd\x7f\x85^\xdf\xe0\x84\x17\xe5\xc05\x8av\xc4\x00', &(0x7f0000000cc0)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[xS\rO\x880\xf1P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac%~\x12\x7ft\xa9\v\xae\x9c\xf3\xb0\xb9\t\x8d\xb9p\xcb\xe3csR\xe2\xfbL\x9f\xb3\xa4^\xc1\xf7m0\xa8\xfd\xcf\xfdY\\d\x03(\x89\xe7\xe1\xcf\xa4m3SQc\xbaG\xcd\xce\xf5o@\xfdi\xd1w~\xc8\xb9\\\a\xeba\x18\x95\x94\xea\xd4\xe8\xcaP\x89\x9b\x12\xa7\xdb\x95c=\x16\xd5\x06\xf9O\x87\x02\xcd\xa4\xc0\xa17\x92]_\xa2>\xbb\xc8?\x98\xa6+\xcf^\xa0\xe8\x9a\x9e>O\xbf\xd3Fd\xfe\x9c|0\xdd\x7f\x85^\xdf\xe0\x84\x17\xe5\xc05\x8av\xc4\x00'/595, &(0x7f0000000f40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001440)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xb3\x01\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[xS\rO\x880\xf1P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac%~\x12\x7ft\xa9\v\xae\x9c\xf3\xb0\xb9\t\x8d\xb9p\xcb\xe3csR\xe2\xfbL\x9f\xb3\xa4^\xc1\xf7m0\xa8\xfd\xcf\xfdY\\d\x03(\x89\xe7\xe1\xcf\xa4m3SQc\xbaG\xcd\xce\xf5o@\xfdi\xd1w~\xc8\xb9\\\a\xeba\x18\x95\x94\xea\xd4\xe8\xcaP\x89\x9b\x12\xa7\xdb\x95c=\x16\xd5\x06\xf9O\x87\x02\xcd\xa4\xc0\xa17\x92]_\xa2>\xbb\xc8?\x98\xa6+\xcf^\xa0\xe8\x9a\x9e>O\xbf\xd3Fd\xfe\x9c|0\xdd\x7f\x85^\xdf\xe0\x84\x17\xe5\xc05\x8av\xc4\x00'], &(0x7f0000000080)=[&(0x7f0000002100)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000000400)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfE\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\x06\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001240)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a', &(0x7f00000016c0)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xdf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*t\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x10(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[xS\rO\x880\xf1P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xb9\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac%~\x12\x7ft\xa9\v\xae\x9c\xf3\xb0\xb9\t\x8d\xb9p\xcb\xe3csR\xe2\xfbL\x9f\xb3\xa4^\xc1\xf7m0\xa8\xfd\xcf\xfdY\\d\x03(\x89\xe7\xe1\xcf\xa4m3SQc\xbaG\xcd\xce\xf5o@\xfdi\xd1w~\xc8\xb9\\\a\xeba\x18\x95\x94\xea\xd4\xe8\xcaP\x89\x9b\x12\xa7\xdb\x95c=\x16\xd5\x06\xf9O\x87\x02\xcd\xa4\xc0\xa17\x92]_\xa2>\xbb\xc8?\x98\xa6+\xcf^\xa0\xe8\x9a\x9e>O\xbf\xd3Fd\xfe\x9c|0\xdd\x7f\x85^\xdf\xe0\x84\x17\xe5\xc05\x8av\x00'/614]) 20:21:35 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) 20:21:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x34000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x34, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}}, 0x0) 20:21:35 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) [ 460.075925] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 460.131813] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 460.162442] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x0) dup3(r0, r1, 0x0) 20:21:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:21:35 executing program 4: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'team0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="4400000010000104000000d9ffffff0000000000", @ANYRES32, @ANYBLOB="0001000000000000240012000c00010062726964676500000c0002000800050001000000080001"], 0x44}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0xf, 0x0) 20:21:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x34010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:35 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) [ 460.419425] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 460.433136] device team1 entered promiscuous mode [ 460.453196] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 460.489603] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x700}, 0x700) 20:21:36 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) 20:21:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000340)=@newlink={0x4c, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x20, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r2}, @IFLA_IPTUN_6RD_PREFIX={0x14, 0xb, @mcast1}]}}}]}, 0x4c}}, 0x0) 20:21:36 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@dev, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@broadcast, 0x0, 0x32}, @in6=@rand_addr=' \x01\x00', {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @replay_esn_val={0x1c, 0x17, {0x1e}}]}, 0x154}}, 0x0) 20:21:36 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000000)) 20:21:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x34020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:36 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="d800000018008100e00f80ecdb4cb904021d65ef0b007c06e87c55a1bc000900f8000699030000000500150005008178a8001600190001000200000094060402026efb8000a007a290457f0189b316277ce06bbace6617cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe04000000730d16a4683e4f6d0200003f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e04adcdf639cb9dbcdcc6b4c1f215ce3bb9ad809d5e1cace81ed0be0b42affcbee5de6ccd40dd6e4edef3d93452a92307f27260e970300000000", 0xd8}], 0x1}, 0x0) 20:21:36 executing program 4: mq_open(&(0x7f0000000000)='\\\'+\'&\x00', 0x40, 0x0, &(0x7f0000000040)={0x80, 0x10001, 0x3, 0xb9}) 20:21:36 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) [ 461.001496] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 461.034300] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) pwrite64(r1, &(0x7f00000002c0)='_', 0x1, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) ioctl$FIBMAP(r0, 0x1, &(0x7f00000000c0)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(r2, &(0x7f0000000380), 0x101bf) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, 0xffffffffffffffff, 0x0, 0x8}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendmsg$OSF_MSG_ADD(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r3, 0x0, 0x0) sendmmsg(r3, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 461.054366] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:36 executing program 4: r0 = socket(0x28, 0x1, 0x0) setsockopt$rose(r0, 0x28, 0x1, 0x0, 0x0) 20:21:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x34030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 461.369060] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 461.387057] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 461.416268] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xa00}, 0x700) 20:21:37 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) 20:21:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x3c, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x2}]}, @NFT_MSG_DELFLOWTABLE={0x30, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x4}]}], {0x14, 0x10}}, 0xb4}}, 0x0) 20:21:37 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_SETINTERFACE(r0, 0x8004550f, &(0x7f0000000080)) 20:21:37 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) dup2(r2, r1) r3 = accept4(r1, 0x0, 0x0, 0x0) dup2(r0, r3) 20:21:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x35000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:37 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000240)={@multicast, @remote, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x2, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @random="a4cd65ea0b7b", @empty}}}}, 0x0) 20:21:37 executing program 1: close(0xffffffffffffffff) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000007580)='batadv\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x24, r0, 0x1, 0x0, 0x0, {0xf}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00002cbd7000fb00310000000000080400000900000005003500090000000800310004000000050037000100000008003b0004000000050033000200000008000b000700000008002c0200"/86], 0x64}}, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_GET(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) accept$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x18, &(0x7f0000000100)=0x80000003, 0x4) bind$inet(r3, &(0x7f0000738ff0)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r3, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x1) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f00000000c0)=[@mss, @mss, @mss, @mss, @timestamp, @sack_perm], 0x132) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x20000004, 0x32fe3cf0}, 0x14) shutdown(r3, 0x1) 20:21:37 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) 20:21:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xb5c}, 0x700) [ 461.917403] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 461.943016] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:37 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000000900)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x19, &(0x7f0000000100), 0x8) 20:21:37 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000240)={@multicast, @remote, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x2, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @random="a4cd65ea0b7b", @empty}}}}, 0x0) [ 462.042266] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x35010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:37 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) 20:21:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000140)={0x14, 0xa, 0xa, 0x3}, 0x14}}, 0x0) 20:21:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r0, 0x0, 0x0, 0x200000c0, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmmsg$inet(r0, &(0x7f0000001d40)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)="85", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001f80)=[{&(0x7f0000000680)='[', 0x1}], 0x1}}], 0x2, 0x604d800) 20:21:37 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x14}}, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x29, &(0x7f0000000200)={{{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}}, {{@in6=@remote}, 0x0, @in=@loopback}}, 0xe8) 20:21:37 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) [ 462.300127] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 462.353871] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:37 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 20:21:37 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) [ 462.422206] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:37 executing program 1: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)={0x14, r0, 0xc573de0d27bdfe6f, 0x0, 0x0, {0x8}}, 0x14}}, 0x0) 20:21:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x35020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:38 executing program 5: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x0, 0x6}, 0x1c) r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x52) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}]}]}, 0x3c}}, 0x0) 20:21:38 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) 20:21:38 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 20:21:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xb68}, 0x700) 20:21:38 executing program 1: r0 = socket(0x1000000010, 0x80002, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000005c0)=ANY=[@ANYBLOB='H\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32, @ANYBLOB="0000000000000000b37200000b000100666c6f776572"], 0x48}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 20:21:38 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 463.013857] nla_parse: 2 callbacks suppressed [ 463.013867] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 463.039902] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:21:38 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) 20:21:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1e, 0x77}}, &(0x7f0000000080)='GPL\x00', 0x4, 0x99, &(0x7f0000000340)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 463.073924] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 463.090628] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 463.108132] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 20:21:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x35030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:38 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000080)={'vcan0\x00'}) 20:21:38 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 20:21:38 executing program 5: perf_event_open(&(0x7f0000000000)={0x1000000007, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:21:38 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) 20:21:38 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 20:21:38 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x2) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={0x0}}, 0x0) [ 463.434380] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 463.452257] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 463.479299] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xe00}, 0x700) 20:21:39 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV4_HTHRESH={0x6}]}, 0x1c}}, 0x0) 20:21:39 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x2, {0x0, @loopback}}}], 0x20}}], 0x2, 0x405ab94) 20:21:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, 0x0, 0x26}, 0x20) 20:21:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 20:21:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x36000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x2}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x8, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 20:21:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x40) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 20:21:39 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, 0x0, 0x0) 20:21:39 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, 0x0, 0x0, 0x405ab94) [ 464.045171] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 464.077523] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 464.119216] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 20:21:39 executing program 5: r0 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f00000000c0)={0x0, 0x93, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x0, 0x0, [], @p_u32=0x0}}) 20:21:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xf00}, 0x700) 20:21:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x36010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:40 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, 0x0, 0x0, 0x405ab94) 20:21:40 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rename(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 20:21:40 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000780)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80) bind$llc(r0, &(0x7f00000001c0)={0x1a, 0x200, 0x0, 0x3f, 0x81, 0x6, @multicast}, 0x10) 20:21:40 executing program 4: perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 464.920914] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 464.937644] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:40 executing program 4: perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 20:21:40 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, 0x0, 0x0, 0x405ab94) 20:21:40 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x6c, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_HOOK={0x40, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bond_slave_0\x00'}, {0x14, 0x1, 'dummy0\x00'}]}]}]}, @NFT_MSG_DELFLOWTABLE={0x30, 0x18, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x4}]}], {0x14, 0x10}}, 0xe4}}, 0x0) 20:21:40 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000005200)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/4104, 0x1008}, {&(0x7f00000019c0)=""/4085, 0xff5}], 0x3}, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0xffffffffffffffdb, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) [ 464.971947] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x36020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:40 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 465.180547] netlink: 32267 bytes leftover after parsing attributes in process `syz-executor.1'. [ 465.213326] netlink: 32267 bytes leftover after parsing attributes in process `syz-executor.1'. [ 465.276285] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 465.300226] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 465.309896] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x1500}, 0x700) 20:21:40 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x1, 0x405ab94) 20:21:40 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000004240)='/dev/mixer\x00', 0x0, 0x0) ioctl$SOUND_MIXER_WRITE_VOLUME(r0, 0xc0044d0f, &(0x7f0000000900)) 20:21:40 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 20:21:40 executing program 1: syz_emit_ethernet(0x52, &(0x7f0000000140)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0xc, 0x4, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x4}, @local, {[@timestamp_addr={0x44, 0x1c, 0x14, 0x1, 0x0, [{@private}, {@multicast1}, {@broadcast}]}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) 20:21:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x36030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:41 executing program 5: r0 = socket(0x23, 0x5, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x113, 0x2, 0x0, 0x1590000) 20:21:41 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 465.805595] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 465.843941] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:41 executing program 1: r0 = socket(0x1000000010, 0x80002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000800ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=@deltfilter={0x24, 0x24, 0xe51ce6a83a21a92f, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xa, 0x8}}}, 0x24}, 0x8}, 0x0) [ 465.867530] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x37000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:41 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880), 0x0, 0x405ab94) 20:21:41 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x0, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 465.989329] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 466.059425] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 466.077696] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 466.129617] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 466.154570] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:41 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880), 0x0, 0x405ab94) 20:21:41 executing program 5: socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCRSGCAUSE(r0, 0x89e0, 0x0) 20:21:41 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x0, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 20:21:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f00000000c0)=ANY=[@ANYBLOB="3f00fd00e0bbb557f3b0b91442c379983f01000000ad15be144a70a053dfcdeb987fbd3c236bfa1c251b4a45bfe30f444dc5e314658f7c945fa4adbb2c9249dd44be32dc79b39812dda876840f3f971dd75e672624fe1584a53a"], 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800000020005221b, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100), &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 20:21:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x16e4}, 0x700) 20:21:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x37010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:41 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880), 0x0, 0x405ab94) 20:21:41 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x0, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 466.683700] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:21:41 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x11, 0xb, &(0x7f00000001c0)={@empty}, &(0x7f0000000200)=0x20) [ 466.725612] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 466.742110] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:42 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x1, 0x0) 20:21:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x37020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:42 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x418, 0x120, 0x0, 0x0, 0x0, 0xc403, 0x348, 0x210, 0x210, 0x348, 0x210, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0xf8, 0x120, 0x0, {}, [@common=@inet=@socket3={{0x28, 'socket\x00'}, 0x8}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138, 'rt\x00'}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @mcast1, @private1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast1, @dev, @remote, @mcast2, @private0, @mcast2, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast1, @mcast2, @dev, @empty]}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x478) 20:21:42 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x0, 0x4, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 20:21:42 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x1, 0x0) [ 466.868954] xt_socket: unknown flags 0x8 20:21:42 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x0, 0x4, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 466.969886] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 466.999436] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 467.051247] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:42 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='bbr\x00', 0x4) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2000c011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0xac14140d}, 0x10) 20:21:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x16f0}, 0x700) 20:21:42 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x1c, 0x2, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 20:21:42 executing program 3: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000880)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x1, 0x0) 20:21:42 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x0, 0x4, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 20:21:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x37030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:42 executing program 1: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@in={0x2, 0x4e23, @multicast1}, 0x80, 0x0, 0x0, &(0x7f0000000780)=[{0x10, 0x1, 0x1f}], 0x10}, 0x0) 20:21:42 executing program 5: creat(&(0x7f0000000100)='./file1\x00', 0x0) symlink(&(0x7f0000000000)='./file1/file0\x00', &(0x7f00000003c0)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0x0, 0x0}) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 20:21:42 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x0, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 20:21:42 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000040)={{}, {0x2755978e933d264, @local}, 0x6a, {0x2, 0x0, @empty}, 'vlan0\x00'}) [ 467.578305] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 467.614015] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x13, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x4b}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 20:21:42 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x0, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 467.672930] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000180)="480000001400190a20ffff7fffffff5602113b850e1de0970200000000fe58a2bc0000de213ee23ffbf50080000000005d002b00"/72, 0x48}], 0x1) 20:21:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x1800}, 0x700) 20:21:43 executing program 5: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r4, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) 20:21:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x38000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x0, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 20:21:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f00000001c0)='gtp\x00') sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r1, 0x31, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 20:21:43 executing program 3: r0 = socket(0xa, 0x40000000002, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000001500)={'dummy0\x00'}) 20:21:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x4, 0x0, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 20:21:43 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000000)={0x1f, @fixed}, 0x8) listen(r0, 0x0) 20:21:43 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) [ 468.437440] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:21:43 executing program 1: setresuid(0x0, 0xee01, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) 20:21:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x4, 0x0, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 20:21:43 executing program 5: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xe, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) mmap(&(0x7f0000f08000/0x1000)=nil, 0x1000, 0x0, 0x112, r0, 0x0) [ 468.493618] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 468.536412] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x18ec}, 0x700) 20:21:44 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 20:21:44 executing program 5: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0x3, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000000), &(0x7f00000000c0)}, 0x20) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000080)="1e", &(0x7f0000000140)=@tcp6=r1}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f00000001c0)={r0, &(0x7f0000000200)="1e", &(0x7f0000000300)=@tcp6}, 0x20) 20:21:44 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x4, 0x0, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 20:21:44 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x8) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000280)=ANY=[], 0x8) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000000c0)=""/132, &(0x7f0000000000)=0x84) 20:21:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x38010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:44 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) bind$l2tp(r0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0x10) connect$l2tp(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) [ 469.282838] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:21:44 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ftruncate(r1, 0x40) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x2e) 20:21:44 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 20:21:44 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff000000007265646972656374000000000000000000000000000000000000ec04d7ad29dc85fb000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00f40000"]}, 0x3a8) [ 469.332916] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:44 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) [ 469.387038] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:44 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff000000007265646972656374000000000000000000000000000000000000ec04d7ad29dc85fb000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00f40000"]}, 0x3a8) 20:21:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x19b4}, 0x700) 20:21:45 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 20:21:45 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast1, 0x1}, 0x1c) getsockname(r0, 0x0, &(0x7f0000000600)) 20:21:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x38020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:45 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newnexthop={0x24, 0x68, 0x3, 0x0, 0x0, {}, [@NHA_GROUP={0x4}, @NHA_GROUP_TYPE={0x6}]}, 0x24}}, 0x0) 20:21:45 executing program 3: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 20:21:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) fallocate(r0, 0x0, 0x0, 0x1ff) [ 470.142352] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=104 sclass=netlink_route_socket pid=31535 comm=syz-executor.5 [ 470.171694] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:21:45 executing program 5: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100), 0x1, 0x0, 0x3b}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) 20:21:45 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 20:21:45 executing program 3: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) [ 470.225031] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 470.269001] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:45 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) r2 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x10, 0x1403, 0x1}, 0x10}}, 0x0) 20:21:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x38030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 470.454757] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 470.465743] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 470.482419] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x1d4c}, 0x700) 20:21:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) connect$netlink(r0, &(0x7f0000000080), 0x2) 20:21:46 executing program 3: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff000000007265646972656374000000000000000000000000000000000000ec04d7ad29dc85fb000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00f40000"]}, 0x3a8) 20:21:46 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 20:21:46 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x1000000002, 0x70, 0xc9, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0xd96}, 0xc000, 0x0, 0xfffffffd}, 0x0, 0xc, 0xffffffffffffffff, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000180)=""/94) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, r0, 0x1a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) mkdir(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getpid() gettid() kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000300)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(0xffffffffffffffff, 0xf504, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) keyctl$get_persistent(0x3, r2, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 20:21:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x39000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:46 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 471.044343] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:21:46 executing program 5: r0 = socket(0x29, 0x2, 0x0) setsockopt$ax25_SO_BINDTODEVICE(r0, 0x119, 0x19, 0x0, 0x300) 20:21:46 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff000000007265646972656374000000000000000000000000000000000000ec04d7ad29dc85fb000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00f40000"]}, 0x3a8) 20:21:46 executing program 1: r0 = socket(0x200000000000011, 0x80002, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'macvlan0\x00', 0x0}) sendmmsg(r0, &(0x7f0000004180)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80, 0x0}}], 0x1, 0x0) [ 471.107692] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 471.139001] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x39010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:46 executing program 5: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x2, 0x4, 0x4, 0xff, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000001740)={0x0, &(0x7f0000001540)=""/229, &(0x7f0000001640), &(0x7f0000001700), 0xa8, r0}, 0x38) [ 471.351048] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 471.369815] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 471.390768] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x1f00}, 0x700) 20:21:47 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 20:21:47 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000140)={'wlan0\x00', 0x0}) r4 = gettid() sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000380)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_PID={0x8, 0x52, r4}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x24}}, 0x0) 20:21:47 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_GET_REQUEST_TABLE(r0, 0x2286, &(0x7f0000000040)) 20:21:47 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 20:21:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x39020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:47 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) [ 471.940581] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 20:21:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000007c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x1300, 0x1120, 0xb, 0x11, 0x0, 0x0, 0x1230, 0x258, 0x258, 0x1230, 0x258, 0x3, 0x0, {[{{@ipv6={@dev, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, [], [], 'wg2\x00', 'macvlan1\x00'}, 0x0, 0x10d8, 0x1120, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x1, 0x0, 0x0, 0x0, './cgroup.cpu/syz1\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@ipv6={@private2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], [], 'vxcan1\x00', 'team0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1360) 20:21:47 executing program 3: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) [ 471.989906] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:21:47 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3) sendmmsg$inet6(r0, &(0x7f0000000000)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1}, 0x1c, 0x0}}], 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x5, &(0x7f00000000c0)=0x401, 0x4) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 20:21:47 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) 20:21:47 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'syz_tun\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="02"]}) [ 472.069264] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 472.088468] xt_cgroup: invalid path, errno=-2 [ 472.107820] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x27d0}, 0x700) 20:21:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x39030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:48 executing program 1: syz_emit_ethernet(0x86, &(0x7f0000000000)={@local, @random="a16965636870", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x11, 0x0, @rand_addr, @empty}, {0x4e20, 0x4e21, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x0, "fbbae1c431d73a5cd4291252414fe0ced3063dccd1ef4216b67aa7fbc97e299d", "49e878b00ca8705ff3cc66c29eefac71", {"278fb65f79dd0e46db16d01892ca6456", "9ac56fc0d303deb1735c8f580441ddb6"}}}}}}}, 0x0) 20:21:48 executing program 3: socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 20:21:48 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) 20:21:48 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x3d, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, 0x0) [ 472.814445] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 472.848900] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:48 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000002900)={'gre0\x00', &(0x7f0000002840)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @dev}}}}) 20:21:48 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @dev}}, 0x63, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x1}], 0x1}, 0x60) 20:21:48 executing program 3: socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 20:21:48 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 472.886514] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3a000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:48 executing program 5: r0 = socket(0x11, 0x3, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x60, 0x0, 0x0) [ 473.170890] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 473.182536] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 473.202953] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x27e0}, 0x700) 20:21:48 executing program 3: socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) 20:21:48 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4008550d, 0x0) 20:21:48 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 20:21:48 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f00000002c0)='/dev/bus/usb/00#/00#\x00', 0x76, 0x141201) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000100)={0x2, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) 20:21:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3a010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) get_mempolicy(&(0x7f0000000240), 0x0, 0x0, &(0x7f00007b1000/0x4000)=nil, 0x4) 20:21:49 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x3a8) [ 473.767874] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 473.801710] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup(r0) getsockopt$netlink(r1, 0x10e, 0x4, &(0x7f00000192c0)=""/102384, &(0x7f00000000c0)=0x18ff0) 20:21:49 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 473.864951] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3a020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:49 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x3a8) [ 474.083833] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 474.109993] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 474.133934] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x27e8}, 0x700) 20:21:49 executing program 1: io_setup(0x7ff, &(0x7f0000000080)=0x0) io_getevents(r0, 0xfffffffffffffffa, 0x0, 0x0, 0x0) 20:21:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) get_mempolicy(&(0x7f0000000240), 0x0, 0x0, &(0x7f00007b1000/0x4000)=nil, 0x4) 20:21:49 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x0, 0x0, 0x10020000000, 0x0}, 0x2c) 20:21:49 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x3a8) 20:21:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3a030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:50 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, 0x0}, 0x3a8) [ 474.722835] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:21:50 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x0, 0x0, 0x10020000000, 0x0}, 0x2c) 20:21:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x17, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x68}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 474.769143] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 474.807998] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:50 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) get_mempolicy(&(0x7f0000000240), 0x0, 0x0, &(0x7f00007b1000/0x4000)=nil, 0x4) 20:21:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3b000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:50 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, 0x0}, 0x3a8) [ 475.054856] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 475.074266] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 475.096581] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x27f4}, 0x700) 20:21:50 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x0, 0x0, 0x10020000000, 0x0}, 0x2c) 20:21:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xfe6f) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cgroup.controllers\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000100), 0x12) write$cgroup_subtree(r2, 0x0, 0x200600) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r0}) 20:21:50 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, 0x0}, 0x3a8) 20:21:50 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) get_mempolicy(&(0x7f0000000240), 0x0, 0x0, &(0x7f00007b1000/0x4000)=nil, 0x4) 20:21:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3b010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:50 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) 20:21:50 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[]}, 0x78) [ 475.711025] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:21:51 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) read$char_raw(r0, 0x0, 0x0) 20:21:51 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) get_mempolicy(&(0x7f0000000240), 0x0, 0x0, &(0x7f00007b1000/0x4000)=nil, 0x4) [ 475.751712] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:51 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[]}, 0x78) 20:21:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) [ 475.819515] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:51 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={{0x14}, [@NFT_MSG_DELFLOWTABLE={0x2c, 0x18, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x10}}, 0x54}}, 0x0) 20:21:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3b020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:51 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) get_mempolicy(&(0x7f0000000240), 0x0, 0x0, &(0x7f00007b1000/0x4000)=nil, 0x4) 20:21:51 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000840)={0x4, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x40) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) 20:21:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x2a02}, 0x700) 20:21:51 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[]}, 0x78) 20:21:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockname(r1, &(0x7f00000014c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001540)=0x80) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000001580)=@deltfilter={0x24, 0x2d, 0x5, 0x0, 0x0, {0x0, 0x0, 0x0, r2}}, 0x24}}, 0x0) 20:21:51 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) get_mempolicy(&(0x7f0000000240), 0x0, 0x0, &(0x7f00007b1000/0x4000)=nil, 0x4) 20:21:51 executing program 4: mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) get_mempolicy(0x0, &(0x7f00000000c0), 0x7fff, &(0x7f0000000000/0x2000)=nil, 0x2) 20:21:51 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB]}, 0x78) 20:21:51 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x1, 0x0, &(0x7f00000000c0)) [ 476.665469] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:21:52 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) get_mempolicy(&(0x7f0000000240), 0x0, 0x0, &(0x7f00007b1000/0x4000)=nil, 0x4) [ 476.737489] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 476.775118] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:52 executing program 4: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r1) r2 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000380)='>', 0x1, r2) keyctl$get_security(0x6, r3, 0x0, 0x0) 20:21:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3b030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:52 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB]}, 0x78) 20:21:52 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @private1}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000900)={0x1, [0x0]}, &(0x7f0000000940)=0x8) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000900)={0x1, [0x0]}, &(0x7f0000000940)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x76, &(0x7f00000000c0)={r3}, 0x8) [ 477.016889] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 477.027503] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 477.040006] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x3075}, 0x700) 20:21:52 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) get_mempolicy(&(0x7f0000000240), 0x0, 0x0, &(0x7f00007b1000/0x4000)=nil, 0x4) 20:21:52 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB]}, 0x78) 20:21:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) listen(r1, 0x0) dup2(r0, r1) 20:21:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3c000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:52 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff000000007265646972656374000000000000000000000000000000000000ec04d7ad29dc85fb000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff00000000"]}, 0x210) 20:21:52 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) get_mempolicy(&(0x7f0000000240), 0x0, 0x0, &(0x7f00007b1000/0x4000)=nil, 0x4) 20:21:52 executing program 4: syz_emit_ethernet(0x8a, &(0x7f0000000180)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr, @multicast1}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, {[@generic={0x0, 0x38}, @md5sig={0x13, 0x12, "9d1713e98debc89589102743a0cc1a8c"}, @sack_perm, @md5sig={0x13, 0x12, "db1484bc63dc421510bc4bd556887b58"}, @timestamp={0x8, 0xa}, @exp_fastopen={0xfe, 0x11, 0xf989, "ccc5e535d74f2390927174d638"}]}}}}}}}, 0x0) [ 477.550964] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 477.582427] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:52 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x210) 20:21:52 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) get_mempolicy(&(0x7f0000000240), 0x0, 0x0, &(0x7f00007b1000/0x4000)=nil, 0x4) [ 477.656750] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:52 executing program 4: r0 = fanotify_init(0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, 0x0) 20:21:53 executing program 1: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) setsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000140)=0x1, 0x4) 20:21:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x3400}, 0x700) 20:21:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3c010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:53 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x210) 20:21:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) get_mempolicy(&(0x7f0000000240), 0x0, 0x0, &(0x7f00007b1000/0x4000)=nil, 0x4) 20:21:53 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='hugetlbfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}]}) 20:21:53 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newlink={0x20, 0x12, 0x1}, 0x20}}, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 20:21:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) get_mempolicy(&(0x7f0000000240), 0x0, 0x0, &(0x7f00007b1000/0x4000)=nil, 0x4) 20:21:53 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff000000007265646972656374000000000000000000000000000000000000ec04d7ad29dc85fb000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000"]}, 0x2dc) [ 478.542583] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 478.576918] overlayfs: workdir and upperdir must reside under the same mount 20:21:53 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, r0, 0x0) get_mempolicy(&(0x7f0000000240), 0x0, 0x0, &(0x7f00007b1000/0x4000)=nil, 0x4) [ 478.610537] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 478.622180] overlayfs: workdir and upperdir must reside under the same mount 20:21:53 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x2dc) [ 478.658288] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:53 executing program 4: r0 = socket(0x10, 0x3, 0xa) sendmsg$NFT_BATCH(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000200)={{0x14}, [], {0x14}}, 0x28}}, 0x0) 20:21:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3c020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 478.900022] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 478.919300] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 478.930074] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x3436}, 0x700) 20:21:54 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, r0, 0x0) get_mempolicy(&(0x7f0000000240), 0x0, 0x0, &(0x7f00007b1000/0x4000)=nil, 0x4) 20:21:54 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x2dc) 20:21:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000180)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) 20:21:54 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000100)=@chain={'key_or_keyring:', r0, ':chain\x00'}) 20:21:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3c030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:54 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/714]}, 0x342) 20:21:54 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000280)) [ 479.418663] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:21:54 executing program 4: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fb0\x00', 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x10, 0x0) 20:21:54 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, r0, 0x0) get_mempolicy(&(0x7f0000000240), 0x0, 0x0, &(0x7f00007b1000/0x4000)=nil, 0x4) [ 479.474902] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 479.530553] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:54 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1}}, 0xfffffe67) 20:21:54 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/714]}, 0x342) 20:21:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x3634}, 0x700) 20:21:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3d000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:55 executing program 4: r0 = socket(0xa, 0x2400000001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000034000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) getsockopt$inet6_buf(r0, 0x29, 0x10000000000030, &(0x7f0000034000)=""/144, &(0x7f0000000080)=0x90) 20:21:55 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) get_mempolicy(&(0x7f0000000240), 0x0, 0x0, &(0x7f00007b1000/0x4000)=nil, 0x4) 20:21:55 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000020c0)='./file0\x00', 0x2a442, 0x0) fallocate(r1, 0x0, 0x0, 0x40000) fallocate(r0, 0x20, 0x0, 0xffffffff000) 20:21:55 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/714]}, 0x342) 20:21:55 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x375) 20:21:55 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) get_mempolicy(&(0x7f0000000240), 0x0, 0x0, &(0x7f00007b1000/0x4000)=nil, 0x4) 20:21:55 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000340)={'broute\x00'}, &(0x7f0000000200)=0x78) [ 480.401113] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:21:55 executing program 4: r0 = socket(0xa, 0x2400000001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000034000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) getsockopt$inet6_buf(r0, 0x29, 0x10000000000030, &(0x7f0000034000)=""/144, &(0x7f0000000080)=0x90) [ 480.465233] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 480.485103] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:55 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x375) 20:21:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3d010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 480.697024] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 480.712084] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 480.733668] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x3a98}, 0x700) 20:21:56 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, 0xffffffffffffffff, 0x0) get_mempolicy(&(0x7f0000000240), 0x0, 0x0, &(0x7f00007b1000/0x4000)=nil, 0x4) 20:21:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@ipv4_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, [@RTA_GATEWAY={0x8, 0x5, @dev}]}, 0x24}}, 0x0) 20:21:56 executing program 1: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000140)={{&(0x7f000046a000/0x4000)=nil, 0x4000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000224000/0x400000)=nil, 0x400000}, 0x2}) 20:21:56 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x375) 20:21:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3d020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:56 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff000000007265646972656374000000000000000000000000000000000000ec04d7ad29dc85fb000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e617400"/791]}, 0x38f) 20:21:56 executing program 4: syz_emit_ethernet(0x26, &(0x7f0000000080)={@local, @dev, @void, {@ipv4={0x800, @generic={{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xac, 0x2}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp={0x7, 0x4, 0x2c, 0x3}]}}}}}}, 0x0) 20:21:56 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f00007b1000/0x4000)=nil, 0x4) [ 481.350304] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:21:56 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSWINSZ(r0, 0x5402, &(0x7f0000000040)={0xffff}) [ 481.397255] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 481.439590] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:56 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/791]}, 0x38f) 20:21:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3d030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 481.698900] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 481.709293] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 481.722486] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x4000}, 0x700) 20:21:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1a, 0x4, &(0x7f0000000000)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], {0x95, 0x0, 0x0, 0x7f010000}}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 20:21:57 executing program 4: setreuid(0xffffffffffffffff, 0xee01) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) 20:21:57 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f00007b1000/0x4000)=nil, 0x4) 20:21:57 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/791]}, 0x38f) 20:21:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3e000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:57 executing program 1: syz_mount_image$msdos(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x1000, 0x0) [ 482.244608] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:21:57 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x39c) 20:21:57 executing program 4: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_AD_ACTOR_SYSTEM={0x8, 0x1a, @local}]}}}]}, 0x3c}}, 0x0) 20:21:57 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f00007b1000/0x4000)=nil, 0x4) [ 482.289343] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 482.309134] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3e010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:57 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x39c) [ 482.531311] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 482.556387] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 482.585034] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x4002}, 0x700) 20:21:58 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@migrate={0x138, 0x21, 0x1, 0x0, 0x0, {{@in6=@ipv4={[0x11], [], @multicast1}, @in6=@dev}}, [@migrate={0xe8, 0x11, [{@in=@multicast2, @in=@dev, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @in6=@private2}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@broadcast, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {@in6=@loopback, @in=@remote, @in6=@mcast1, @in=@empty}]}]}, 0x138}}, 0x0) 20:21:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000003c0)={0x2c, r1, 0x1, 0x0, 0x0, {0x6}, [@ETHTOOL_A_STRSET_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}]}]}, 0x2c}}, 0x0) 20:21:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) get_mempolicy(&(0x7f0000000240), 0x0, 0x0, &(0x7f00007b1000/0x4000)=nil, 0x0) 20:21:58 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x39c) 20:21:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3e020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:58 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a2) 20:21:58 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000000)="fc0000001d000724ab09254ec100070007ab08001b000000f0ffff002100057e0000000000000e000039000000039815fad151ba0101099cecb94b46fe0000000a00020025", 0xffffff0c) r2 = socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r3, 0x0, r1, 0x0, 0xffffffffffff8001, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x4) close(r2) r5 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r5, 0x1, 0x6, &(0x7f0000000080)=0x3f, 0x1d5) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) splice(r0, 0x0, r2, 0x0, 0x4ffdc, 0x0) 20:21:58 executing program 4: bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x7, 0x4, 0x80000000, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) 20:21:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) get_mempolicy(&(0x7f0000000240), 0x0, 0x0, &(0x7f00007b1000/0x4000)=nil, 0x0) [ 483.207633] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 483.266283] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 483.291148] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3e030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:58 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a2) [ 483.509496] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 483.529598] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 483.551342] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x445b}, 0x700) 20:21:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x540d, 0x0) 20:21:59 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) get_mempolicy(&(0x7f0000000240), 0x0, 0x0, &(0x7f00007b1000/0x4000)=nil, 0x0) 20:21:59 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a2) 20:21:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:21:59 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a5) 20:21:59 executing program 5: r0 = socket$isdn_base(0x22, 0x3, 0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "000001000000000008fc9d71fc00000000000000f8ffff002e0b3836005404b0d6301a4ce875f2e3ff5f163ee340b76795008000f8000000000104003c5811039e15775027ecce66fd792bbf0e5bf5ff9b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ff42c65400"}, 0x80) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f0000000080)) [ 484.106302] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:21:59 executing program 1: socket$kcm(0x29, 0x2, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000040)='wlan1\x00\xff\x1a\xec\xb5\x12\x03F\xd9U\x1c\xc9%\x9b\xa0\xf5\xee]\x1f\xb9\xf2-\xda,C\xfdj\xe3\x8d\xe3\xd6\xe0|6L\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbb\xc18\x84\xb5\\f\xcb\xe8%OArYZ\xe1\xc9\x86\xfe\x88\x9d\xfa\xacJ\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xdd2') 20:21:59 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=@newsa={0x144, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@broadcast, 0x0, 0x32}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @offload={0xc}]}, 0x144}}, 0x0) [ 484.163048] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:21:59 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a5) [ 484.206368] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:21:59 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 20:21:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3f010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 484.300542] device wlan1 entered promiscuous mode [ 484.440093] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 484.458580] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 484.488958] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x4800}, 0x700) 20:22:00 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b72, &(0x7f0000000080)=0x2) 20:22:00 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a5) 20:22:00 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="0200000001000000000000000400000000000020100001000000000020"], 0x24, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f0000000000)='./file0\x00', r1, 0x0) chdir(&(0x7f0000000100)='./file0\x00') creat(&(0x7f00000000c0)='./file1\x00', 0x0) 20:22:00 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x40, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x38, 0x16, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0xc81}]}]}], {0x14, 0x10}}, 0xc0}}, 0x0) 20:22:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3f020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 484.988927] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:22:00 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000000)) 20:22:00 executing program 5: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)={0x4c, r0, 0x1, 0x0, 0x0, {0x2c}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}, {0x8, 0x8e}}]}, 0x4c}}, 0x0) 20:22:00 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a7) [ 485.043356] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:00 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000001000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='sys_enter\x00', r0}, 0x10) mbind(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0, 0x0) 20:22:00 executing program 1: socketpair$unix(0x1, 0x200400000000003, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000140)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x924924924924c31, 0x4ffe0) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000000040), 0x4) write$binfmt_script(r1, 0x0, 0x0) close(r0) [ 485.140011] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x3f030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 485.345581] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 485.359608] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 485.370573] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x4c1d}, 0x700) 20:22:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'macvlan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000300)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc, 0x1, 'macvlan\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MACADDR_MODE={0x8}]}}}]}, 0x3c}}, 0x0) 20:22:01 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a7) 20:22:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2c, r1, 0x1, 0x0, 0x0, {0x9}, [@TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x2c}}, 0x0) 20:22:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x12, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x4}}}, @IFLA_GSO_MAX_SIZE={0x8}]}, 0x3c}}, 0x0) 20:22:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:01 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f00000dd000/0x2000)=nil, 0x2) 20:22:01 executing program 3: r0 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0100000019000000000000000000726f7365300000000000000000000000726f73653000000000000000000000007465616d5f736c6176655f310000000064756d6d7930000000000000000000000180c2000000000000000000ffffffffffff0000000000000000d00000000801000038010000706b74747970650000000000000000000000000000000000000000000000000008000000000000000000000000000000706b747479706500000000000000000000000000000000000000000000000000080000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ddffffff000000007265646972656374000000000000000000000000000000000000ec04d7ad29dc85fb000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000030000000000000080357665746831000000000000000000000074756e6c30000000000000000000000074756e6c300000000000000000000000766c616e300000000000000000000000aaaaaaaaaabb000000000000aaaaaaaaaa0000000000000000000001000000010000380100006367726f757000000000000000000000000000000000000000000000000000000800000000000000000000000000000061727000000000000000000000000000000000000000000000000000000000003800000000000000000000000000000000000000000000007f0000010000000072ce35f341210000000000000000000000000000000000000000000000000000646e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff00f400"]}, 0x3a7) [ 485.892485] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.1'. 20:22:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000001800)={&(0x7f00000016c0)=@ipv4_newroute={0x1c, 0x18, 0x619, 0x0, 0x0, {0x2, 0x90}}, 0x1c}}, 0x0) 20:22:01 executing program 1: open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x405}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 485.950396] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 485.984651] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 486.026408] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:01 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)={0x1c, 0x1, 0x4, 0x201, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5}]}, 0x1c}}, 0x0) 20:22:01 executing program 3: r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000580)={{0x0}}) 20:22:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x4fd0}, 0x700) 20:22:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000040)={{0x2, 0x0, @loopback}, {0x0, @random="53363c8cefed"}, 0x2a, {0x2, 0x0, @multicast2}, 'vlan0\x00'}) 20:22:01 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) sendto$inet(r0, 0x0, 0x0, 0x8814, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) 20:22:01 executing program 5: mmap(&(0x7f00007df000/0x2000)=nil, 0x2000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x800000}, 0x200000}) 20:22:02 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x1, 0x4, 0x401, 0x0, 0x0, {}, [@NFULA_CFG_QTHRESH={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_TIMEOUT={0x8}]}, 0x2c}}, 0x0) 20:22:02 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newsa={0x138, 0x10, 0x501, 0x0, 0x0, {{@in6=@mcast2, @in6=@mcast2}, {@in6=@ipv4={[], [], @multicast2}, 0x0, 0x3c}, @in6=@ipv4={[], [], @private}, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}}, 0x0) 20:22:02 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x7, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "182f49dc3a8494d8"}}, 0x48}}, 0x0) [ 486.846322] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 486.877759] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 486.929421] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:02 executing program 4: bpf$OBJ_GET_PROG(0x9, &(0x7f0000002140)={0x0, 0x25}, 0x10) 20:22:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:02 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x3c}, [@ldst={0x4, 0x3}]}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xb579, &(0x7f000000cf3d)=""/195}, 0x48) 20:22:02 executing program 3: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={r2}, &(0x7f0000000080)=0x14) [ 487.180229] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 487.211872] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 487.233365] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x4fe8}, 0x700) 20:22:02 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140), 0x8) 20:22:02 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) poll(0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 20:22:02 executing program 5: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="02", 0x1, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffd, r1, 0x0) 20:22:02 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKSECTGET(r0, 0x125d, &(0x7f0000000040)) 20:22:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:03 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) getsockname$packet(r0, 0x0, &(0x7f00000001c0)) 20:22:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000000)={0x30, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0x400b}, {0x14, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'lo\x00'}}}}}, 0x30}}, 0x0) 20:22:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xc, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x18, 0x65}, [@call={0x5c}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) [ 487.769924] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:22:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x41000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 487.780346] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 487.781448] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:03 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x1c, 0x0, &(0x7f0000000080)) 20:22:03 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0x6a, &(0x7f0000000180)=ANY=[], 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000080)) [ 487.944316] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 487.948622] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 487.949750] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:03 executing program 1: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x4000, 0x0) 20:22:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x41010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 488.645894] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 488.651767] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 488.659427] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:04 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r1, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast1, 0x7}}, 0x24) bind$rxrpc(r0, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x24) 20:22:04 executing program 3: syz_emit_ethernet(0x86, &(0x7f0000000000)={@multicast, @empty=[0x2], @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x1b59, 0x64, 0x0, @wg=@response={0x2, 0x0, 0xffffffff, "000000010865390101000003000000016a3000", "9384bbeb3018ad591b661fe808b21b77", {"694c875dfb1be5d2a0057a62022a1564", "a329d3a13bd5b6cc6a9471314a1d8c69"}}}}}}}, 0x0) 20:22:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x5b44}, 0x700) 20:22:04 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x2, 0x0) write$binfmt_misc(r0, &(0x7f0000000500)={'syz1'}, 0x4) 20:22:04 executing program 1: r0 = getpgrp(0xffffffffffffffff) getpriority(0x2, r0) 20:22:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x41020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:04 executing program 5: syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000000000)={[{@sunit={'sunit', 0x3d, 0x8}}]}) 20:22:04 executing program 3: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x65) 20:22:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x36, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFALIASn={0x4}, @IFLA_XDP={0x14, 0x2b, 0x0, 0x1, [@IFLA_XDP_FLAGS={0x8}, @IFLA_XDP_FD={0x8, 0x1, r2}]}, @IFLA_IFNAME={0x14, 0x3, 'syz_tun\x00'}]}, 0x4c}}, 0x0) 20:22:04 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@getqdisc={0x24, 0x26, 0x905, 0x0, 0x0, {0xa}}, 0x24}}, 0x0) [ 488.977454] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 489.058507] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 489.093947] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='/', r0, &(0x7f0000000040)='./file0\x00') newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setreuid(0x0, r1) futimesat(r0, 0x0, 0x0) 20:22:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x41030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 489.094547] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. [ 489.140772] XFS (loop5): sunit and swidth must be specified together 20:22:04 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60077e00000b2c00fe8000000000000000000000000000bbfe8000000000000000000000000000aa2c"], 0x0) 20:22:04 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x1, 0x4, 0x201, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x1c}}, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, 0x1, 0x4, 0x5}, 0x14}}, 0x0) [ 489.358741] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 489.378563] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 489.393577] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:04 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x5c0b}, 0x700) 20:22:04 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x11, 0x4, 0x4, 0x400, 0x6000000, 0x1}, 0x3c) 20:22:04 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000b9aff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f00000002c0)=0x7, 0x4) recvmmsg(r0, &(0x7f0000002280)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff2f}}], 0x300, 0x43, 0x0) 20:22:04 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x4c, 0x2, {{0x9c}}}}]}, 0x78}}, 0x0) 20:22:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='veno\x00', 0x5) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) 20:22:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x42000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:05 executing program 5: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000400)='X', 0x1, 0xfffffffffffffffe) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000400)="585ccbe4ed83b836c1a6474914dc55e7220629036895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550c1ffffff35c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5ece0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d327ff4f6321390e3ee5de4b58a8d2725591f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539a209ed288de5d6", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r0, r0}, &(0x7f0000000200)=""/171, 0xab, &(0x7f0000000140)={&(0x7f00000003c0)={'xxhash64-generic\x00'}}) 20:22:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060a0000fdc3e80001dd7f9d040d001800ea1103000053000000", 0x29}], 0x1) [ 489.851242] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 489.917801] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 489.952986] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:05 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f00000001c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc0845658, &(0x7f0000000000)) 20:22:05 executing program 3: syz_mount_image$omfs(&(0x7f0000000100)='omfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0xff00, &(0x7f0000000240)) 20:22:05 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket(0x10, 0x80002, 0x0) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0x13, &(0x7f00000001c0), &(0x7f0000000200)=0x20) [ 489.978862] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x42010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 490.147827] could not allocate digest TFM handle xxhash64-generic [ 490.174363] could not allocate digest TFM handle xxhash64-generic [ 490.196880] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 490.213501] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 490.247176] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x5c6c}, 0x700) 20:22:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000061c0)={0x0, 0x0, &(0x7f0000006180)={&(0x7f0000005fc0)=@can_newroute={0x1c, 0x18, 0x1, 0x0, 0x0, {}, [@CGW_LIM_HOPS={0x5}]}, 0x1c}}, 0x0) 20:22:05 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f00000020c0)='ns/uts\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') 20:22:05 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='lockproto=lock_n\nlock,locktable=.']) 20:22:05 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) connect$llc(r0, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x10) 20:22:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x42020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:06 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000580)=ANY=[@ANYRESOCT], 0x177) 20:22:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x2, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x79, 0x10, 0xa8}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe0c, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) [ 490.762999] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 490.785373] gfs2: can't find protocol lock_n [ 490.785373] lock 20:22:06 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x5e04}, 0x700) 20:22:06 executing program 3: newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setreuid(0x0, r0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 490.830238] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 490.880623] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 490.896526] gfs2: can't find protocol lock_n [ 490.896526] lock 20:22:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x42030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:06 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='lockproto=lock_n\nlock,locktable=.']) 20:22:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 20:22:06 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000300)=ANY=[@ANYBLOB="bbbbbbbbbbbb0180c200000008004508000300000000002f9078ac1414aae0000001b481880b"], 0x0) 20:22:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000800)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@mark={0xc, 0x15, {0x35075c}}]}, 0xc4}}, 0x0) 20:22:06 executing program 1: r0 = socket(0x11, 0x2, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000180)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0xb, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa, 0x1, 'codel\x00'}, {0xc, 0x2, [@TCA_CODEL_INTERVAL={0x8}]}}]}, 0x3c}}, 0x0) 20:22:06 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x50, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_NETMASK={0x5, 0x14, 0x6}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x50}, 0x1, 0xffffffff}, 0x0) [ 491.161413] gfs2: can't find protocol lock_n [ 491.161413] lock [ 491.171026] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:22:06 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) r1 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) dup2(r1, r0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0xc, 0x0, &(0x7f0000000000)=[@dead_binder_done], 0xfdfdffff, 0x1000000, 0x0}) 20:22:06 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x2011, r0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000004600)=""/207, 0x1a, 0xcf, 0x1}, 0x20) [ 491.214575] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:06 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='lockproto=lock_n\nlock,locktable=.']) [ 491.278056] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 491.495898] gfs2: can't find protocol lock_n [ 491.495898] lock 20:22:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x6201}, 0x700) 20:22:07 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@nullb='/dev/nullb0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='xfs\x00', 0x5, 0x0) 20:22:07 executing program 3: creat(&(0x7f00000001c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.posix_acl_default\x00', &(0x7f00000000c0)='-[/!\\-)\xa2\x00', 0x9, 0x0) 20:22:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x43000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:07 executing program 1: statx(0xffffffffffffff9c, 0x0, 0x0, 0x8cffffff, 0x0) 20:22:07 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='lockproto=lock_n\nlock,locktable=.']) [ 491.845813] gfs2: can't find protocol lock_n [ 491.845813] lock 20:22:07 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80, [0x3]}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x30}}}, 0xb8}}, 0x0) 20:22:07 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x2}, 0x8) sendto$inet6(r0, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 20:22:07 executing program 4: syz_mount_image$gfs2(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='lockproto=lock_n\nlock,locktable=.']) [ 491.975003] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 492.019472] XFS (nullb0): Invalid superblock magic number [ 492.020175] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:07 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSWINSZ(r0, 0x4b30, &(0x7f0000000000)) 20:22:07 executing program 1: add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, &(0x7f0000000440)='0X', 0x2, 0xfffffffffffffffd) [ 492.097788] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x43010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 492.339600] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 492.353123] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 492.374065] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x6380}, 0x700) 20:22:07 executing program 1: prctl$PR_SET_MM_MAP(0x35, 0xe, &(0x7f0000000280)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000002000/0x4000)=nil, &(0x7f0000011000/0x4000)=nil, &(0x7f0000013000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000002000/0x1000)=nil, &(0x7f0000010000/0x4000)=nil, 0x0}, 0x68) 20:22:07 executing program 4: syz_mount_image$gfs2(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='lockproto=lock_n\nlock,locktable=.']) 20:22:07 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x40605346, 0x0) 20:22:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x43020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:08 executing program 5: r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, 0x0, 0x58) 20:22:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x2}]}, @func_proto={0x0, 0x0, 0x0, 0x2, 0x3}]}}, &(0x7f00000002c0)=""/4096, 0x3a, 0x1000, 0x1}, 0x20) [ 492.893308] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 492.914505] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 492.949648] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:08 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) r0 = creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) writev(r0, &(0x7f0000000700)=[{&(0x7f0000000480)='%', 0x1}], 0x1) lsetxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)=@v2, 0x14, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') acct(&(0x7f0000000440)='./bus/file0\x00') 20:22:08 executing program 4: syz_mount_image$gfs2(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='lockproto=lock_n\nlock,locktable=.']) 20:22:08 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 20:22:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0x5, 0x0, 0x0, 0xe, 0x2}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000002340)=""/4080, 0x2f, 0xff0, 0x1}, 0x20) 20:22:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x43030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 493.285621] Process accounting resumed [ 493.296608] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 493.329770] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 493.363000] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 493.364297] Process accounting resumed 20:22:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x680b}, 0x700) 20:22:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmsg(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x22) 20:22:08 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x27, &(0x7f0000000000)={0x0}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="34010000100005070000007d7900000000000000", @ANYRES32, @ANYBLOB="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"], 0x134}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x2a0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 20:22:08 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='lockproto=lock_n\nlock,locktable=.']) 20:22:08 executing program 3: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) r0 = creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) writev(r0, &(0x7f0000000700)=[{&(0x7f0000000480)='%', 0x1}], 0x1) lsetxattr$security_capability(&(0x7f0000000140)='./bus/file1\x00', &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)=@v2, 0x14, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) link(&(0x7f0000000200)='./bus/file1\x00', &(0x7f00000002c0)='./bus/file0\x00') acct(&(0x7f0000000440)='./bus/file0\x00') 20:22:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x44000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 493.637823] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 493.675100] netlink: 116 bytes leftover after parsing attributes in process `syz-executor.1'. 20:22:08 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='lockproto=lock_n\nlock,locktable=.']) [ 493.697114] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 493.732093] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write$binfmt_aout(r3, 0x0, 0x1) splice(r0, 0x0, r3, 0x0, 0x8ec3, 0x0) readv(r2, &(0x7f0000000580)=[{&(0x7f0000000200)=""/105, 0x69}], 0x1) sendmsg$sock(r1, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) [ 493.750873] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:09 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='lockproto=lock_n\nlock,locktable=.']) 20:22:09 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087705, 0x0) 20:22:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x44010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 493.856360] Process accounting resumed 20:22:09 executing program 3: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) madvise(&(0x7f0000495000/0x400000)=nil, 0x400000, 0x8) [ 493.953042] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 493.987427] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 494.005003] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:09 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x6c5c}, 0x700) 20:22:09 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x70}, [@ldst={0x6, 0x0, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76}, 0x48) 20:22:09 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='lockproto=lock_n\nlock,locktable=.']) 20:22:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x44020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:09 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x50, 0x1, 0x9, 0x3, 0x0, 0x0, {}, [@CTA_TUPLE_REPLY={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2}, {0x14, 0x4, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x50}}, 0x0) [ 494.517625] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 494.542672] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 494.552066] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:09 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000080)={0x0, 0xfc, 0x0, 0x0, "c3cfbc3866811926f8aa98a2667b1a7e8d4ef21b34a1924afb4a1b00"}) 20:22:09 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='lockproto=lock_n\nlock,locktable=.']) 20:22:09 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb, 0x1, 'gretap\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_IFLAGS={0x6, 0x2, 0x9}]}}}]}, 0x3c}}, 0x0) 20:22:09 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r1, 0x407, 0x0) socket$packet(0x11, 0xa, 0x300) write$binfmt_misc(r1, 0x0, 0x4240a2a0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x34}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) [ 494.574054] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 494.604496] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x44030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:09 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) removexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', '\x11/\'\x00'}) r1 = socket$inet6(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) 20:22:09 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='lockproto=lock_n\nlock,locktable=.']) [ 494.826428] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 494.838034] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 494.847851] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x7001}, 0x700) 20:22:10 executing program 1: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cachefiles\x00', 0x0, 0x0) 20:22:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x14, 0x2, 0x6, 0x5, 0x10000000}, 0x14}, 0x1, 0x2000}, 0x0) 20:22:10 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 20:22:10 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x45000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSWINSZ(r0, 0x5419, &(0x7f0000000040)) 20:22:10 executing program 1: syz_mount_image$hfs(&(0x7f0000001a40)='hfs\x00', &(0x7f0000001a80)='./file0\x00', 0x0, 0x0, &(0x7f0000001f40), 0x0, &(0x7f0000002000)={[{@uid={'uid', 0x3d, 0xffffffffffffffff}}]}) [ 495.408640] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 495.437270] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:10 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) [ 495.459182] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:10 executing program 5: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc3631, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x82, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:22:10 executing program 3: sendmsg$NFT_MSG_GETSETELEM(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000680)={0x0, 0x7410}}, 0x0) r0 = socket$inet(0x2, 0x3, 0x8) sendmmsg(r0, &(0x7f00000038c0)=[{{&(0x7f0000000140)=@nl=@unspec, 0x35, &(0x7f0000000100), 0x0, &(0x7f0000000380), 0x2}}, {{&(0x7f00000000c0)=@in, 0x80, &(0x7f0000000240), 0x2b5, &(0x7f0000000480)}}], 0x40000000000004a, 0xb900) 20:22:10 executing program 1: r0 = socket(0x840000000002, 0x3, 0xff) r1 = dup(r0) sendmmsg$inet(r1, &(0x7f0000000580)=[{{&(0x7f0000000000)={0x2, 0x0, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000100)=[@ip_tos_u8={{0x43}}, @ip_tos_int={{0x14}}, @ip_pktinfo={{0x0, 0x0, 0x8, {0x0, @private, @multicast2}}}], 0x48}}], 0x1, 0x0) 20:22:10 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000000180)='/dev/video#\x00', 0x0, 0x2) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) 20:22:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x7401}, 0x700) 20:22:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x45010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:11 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) getsockopt$inet_tcp_int(r1, 0x6, 0x1, 0x0, &(0x7f0000000040)) 20:22:11 executing program 5: syz_mount_image$vfat(&(0x7f00000005c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000280)=[{&(0x7f00000003c0)="eb3c906d6b66732e66617400024301000240000004f8", 0x16}, {0x0, 0x0, 0x600}], 0x18080, &(0x7f0000002f80)=ANY=[]) 20:22:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') r1 = socket$inet6(0x10, 0x3, 0x0) sendfile(r1, r0, 0x0, 0xff) 20:22:11 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) 20:22:11 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xf4) getsockopt$inet6_mreq(r0, 0x29, 0x7, &(0x7f0000000000)={@dev}, &(0x7f0000000040)=0x14) 20:22:11 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[]) 20:22:11 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000080)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x412, r0, 0x0) 20:22:11 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/locks\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x6, &(0x7f0000000040)={0x1}) 20:22:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x2}]}}, &(0x7f0000000100)=""/140, 0x32, 0x8c, 0x8}, 0x20) [ 496.290708] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 496.308795] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8930, &(0x7f0000000080)={'bond_slave_1\x00', @ifru_hwaddr=@local}) [ 496.359900] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 496.488904] gfs2: not a GFS2 filesystem 20:22:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x7530}, 0x700) 20:22:12 executing program 1: r0 = socket(0x21, 0x80002, 0x2) getsockopt$nfc_llcp(r0, 0x110, 0x0, 0x0, 0x400000) 20:22:12 executing program 3: syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) 20:22:12 executing program 5: socket$inet6(0xa, 0x200000000003, 0x87) syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @broadcast, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '\x00', 0xf, 0x2b, 0x0, @local, @local, {[@hopopts={0x87}, @routing], {0x0, 0x0, 0x8}}}}}}, 0x0) 20:22:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x45020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:12 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[]) 20:22:12 executing program 3: r0 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="240000002e0007031dfffdd88302cf145faa0a0000000000000000e5e41be3a20400ff7e280000005e00ffffba169eaa1cfd08b3ebea966cf0554edcdaaf4b46d2427de83f000000000000ff", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000001380)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 20:22:12 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$smc(&(0x7f00000001c0)='SMC_PNETID\x00') sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r1, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 20:22:12 executing program 5: r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0x35, 0x8000011, 0xffffffffffffff9c, &(0x7f00000000c0)='.\x00') fanotify_mark(r0, 0x80, 0x0, 0xffffffffffffffff, 0x0) 20:22:12 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[]) [ 497.160818] gfs2: not a GFS2 filesystem [ 497.179840] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 497.241348] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 497.253193] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:12 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x88, 0x65, 0x0, &(0x7f0000000040)) 20:22:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x45030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 497.355446] gfs2: not a GFS2 filesystem [ 497.441196] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 497.452600] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 497.479003] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:13 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x77dc}, 0x700) 20:22:13 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0xfffffffffffffff5, 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 20:22:13 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000002c0)="ad56b6cc0400aeb995298992ea5400c2", 0x10) recvmmsg(r1, &(0x7f0000002440), 0x3ffffa3, 0x0, 0x0) 20:22:13 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB]) 20:22:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x46000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 498.025587] encrypted_key: keyword 'new' not allowed when called from .update method [ 498.040327] gfs2: not a GFS2 filesystem [ 498.046301] encrypted_key: keyword 'new' not allowed when called from .update method 20:22:13 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000)='batadv\x00') getsockname(r0, &(0x7f0000016d40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x80) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)={0x1c, r2, 0x301, 0x0, 0x0, {0xb}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 20:22:13 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@allocspi={0xf8, 0x16, 0x337, 0x0, 0x0, {{{@in=@multicast2, @in6=@mcast1}, {@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @in6=@private0}}}, 0xf8}}, 0x0) 20:22:13 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB]) [ 498.099692] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 498.126023] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 498.168095] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:13 executing program 5: setrlimit(0x7, &(0x7f0000000140)={0x0, 0x40000000}) [ 498.219663] gfs2: not a GFS2 filesystem 20:22:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x46010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:13 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB]) 20:22:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x7, [@var={0x5, 0x0, 0x0, 0xe, 0x3}, @func_proto={0x0, 0x0, 0x0, 0x2}, @volatile={0x0, 0x0, 0x0, 0xd}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000001340)=""/4073, 0x47, 0xfe9, 0x41}, 0x20) [ 498.406989] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 498.427249] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 498.440192] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 498.466070] gfs2: not a GFS2 filesystem 20:22:14 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x8063}, 0x700) 20:22:14 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setuid(0xee00) ioctl$sock_SIOCGIFCONF(r0, 0x8934, &(0x7f0000000080)=@buf) 20:22:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@empty, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x2}, {{@in6=@mcast2, 0x0, 0x3c}, 0x0, @in=@local}}, 0xe8) 20:22:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, r2, 0x0) 20:22:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x46020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:16 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='lockproto=lock_n\n']) 20:22:16 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\x00') ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x80047441, 0x0) 20:22:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x8088}, 0x700) 20:22:16 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000400)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004", 0x3b, 0x9060}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='inode_readahead_blks=0']) [ 501.294649] gfs2: not a GFS2 filesystem 20:22:16 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendto(r0, &(0x7f00000001c0)="120000001a00e7ef077b1a3fbdf58185539c", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3cb}, {&(0x7f0000000200)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x8, &(0x7f0000000600)=""/206, 0xffffffffffffffa0}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 20:22:16 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='lockproto=lock_n\n']) 20:22:16 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = dup(r0) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000380)={&(0x7f0000000240), 0xc, &(0x7f00000002c0)={0x0}}, 0x0) [ 501.330566] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 501.369103] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:16 executing program 3: r0 = creat(&(0x7f0000000380)='./file0\x00', 0x3e) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='\n'], 0xb) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 20:22:16 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x2ba) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000002c0)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x1, r2}, @IFLA_IPTUN_REMOTE={0x8, 0x3, @local}, @IFLA_IPTUN_ENCAP_SPORT={0x6}]}}}]}, 0x48}}, 0x0) [ 501.445075] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:16 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x20004019) close(r0) 20:22:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x46030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 501.513419] gfs2: not a GFS2 filesystem 20:22:16 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='lockproto=lock_n\n']) 20:22:16 executing program 3: r0 = socket(0x1e, 0x5, 0x0) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000180), 0x4) 20:22:16 executing program 5: gettid() clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) chdir(&(0x7f0000cd2ff8)='./file0\x00') r0 = memfd_create(&(0x7f0000000540)='\xb5\xe25\x95S\x00\x00\x00\x00\x93h0\x00', 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) [ 501.719078] gfs2: not a GFS2 filesystem [ 501.797019] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 501.828393] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 501.906132] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x8303}, 0x700) 20:22:17 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x0, &(0x7f0000000680)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@context={'context', 0x3d, 'system_u'}}, {@context={'context', 0x3d, 'unconfined_u'}}]}}) 20:22:17 executing program 3: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/adsp1\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, 0x0) 20:22:17 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='lockproto=lock_n\nlock,loc']) 20:22:17 executing program 5: r0 = socket(0x15, 0x5, 0x0) setsockopt$inet_int(r0, 0x114, 0xa, 0x0, 0x0) 20:22:17 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x47000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 502.238512] gfs2: invalid mount option: loc 20:22:17 executing program 3: setgroups(0x6b, 0x0) 20:22:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e21}]}, 0x1c}}, 0x0) [ 502.263583] gfs2: can't parse mount arguments 20:22:17 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x2, 0x3, 0x208, 0x0, 0x0, 0x98, 0x0, 0x0, 0x198, 0x198, 0x198, 0x198, 0x198, 0x8000000, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x268) 20:22:17 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='lockproto=lock_n\nlock,loc']) [ 502.302519] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:22:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b00000080000000080000005247", 0x62, 0x400}, {&(0x7f0000000140)="01000000000005002e5e", 0xa, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}], 0x0, &(0x7f0000013c00)) [ 502.347553] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:17 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="18ed03000000000000000000000000d76637"], 0x12}}], 0x40000000000026d, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) [ 502.409659] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 502.458549] gfs2: invalid mount option: loc [ 502.491329] gfs2: can't parse mount arguments 20:22:18 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x8880}, 0x700) 20:22:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43, 0x8}], {0x95, 0x0, 0x0, 0x18000000}}, &(0x7f0000000000)='GPL\x00', 0x5, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) dup(r0) r2 = mq_open(&(0x7f0000000000)='eth0\x00', 0x42, 0x0, 0x0) r3 = openat$full(0xffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x10000, 0x0) syz_open_pts(r3, 0x400) r4 = epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000080)) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) epoll_wait(r4, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}, {}], 0x575, 0x89) 20:22:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x47010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:18 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) rt_sigaction(0xd, &(0x7f0000000280)={&(0x7f0000000200)="c42271bba30945c4930f72d106c4c27d13b20000000036c7f80b000000c4417d70b8930000003cc4e189f22ac483b121e700c442f9aaf0c4c110562ec402b1b82490", 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000400)) close(r2) write$binfmt_misc(r1, 0x0, 0x4240a2a0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r3, r4) splice(r0, 0x0, r2, 0x0, 0x19401, 0x0) 20:22:18 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="18ed03000000000000000000000000d76637"], 0x12}}], 0x40000000000026d, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:18 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='lockproto=lock_n\nlock,loc']) [ 503.159552] gfs2: invalid mount option: loc [ 503.169537] gfs2: can't parse mount arguments 20:22:18 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="18ed03000000000000000000000000d76637"], 0x12}}], 0x40000000000026d, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:18 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='lockproto=lock_n\nlock,locktab']) [ 503.251065] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:22:18 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="18ed03000000000000000000000000d76637"], 0x12}}], 0x40000000000026d, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43, 0x8}], {0x95, 0x0, 0x0, 0x18000000}}, &(0x7f0000000000)='GPL\x00', 0x5, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) dup(r0) r2 = mq_open(&(0x7f0000000000)='eth0\x00', 0x42, 0x0, 0x0) r3 = openat$full(0xffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x10000, 0x0) syz_open_pts(r3, 0x400) r4 = epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000080)) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) epoll_wait(r4, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}, {}], 0x575, 0x89) [ 503.298731] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 503.335933] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:18 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="18ed03000000000000000000000000d76637"], 0x12}}], 0x40000000000026d, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x47020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 503.421495] gfs2: invalid mount option: locktab [ 503.433195] gfs2: can't parse mount arguments [ 503.578889] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 503.589913] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 503.605786] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:19 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x8c02}, 0x700) 20:22:19 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="18ed03000000000000000000000000d76637"], 0x12}}], 0x40000000000026d, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:19 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='lockproto=lock_n\nlock,locktab']) 20:22:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43, 0x8}], {0x95, 0x0, 0x0, 0x18000000}}, &(0x7f0000000000)='GPL\x00', 0x5, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) dup(r0) r2 = mq_open(&(0x7f0000000000)='eth0\x00', 0x42, 0x0, 0x0) r3 = openat$full(0xffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x10000, 0x0) syz_open_pts(r3, 0x400) r4 = epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000080)) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) epoll_wait(r4, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}, {}], 0x575, 0x89) 20:22:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x47030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:19 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f00000002c0)) 20:22:19 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="18ed03000000000000000000000000d76637"], 0x12}}], 0x40000000000026d, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:19 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) setresuid(0xffffffffffffffff, 0x0, 0x0) [ 504.137026] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 504.140880] gfs2: invalid mount option: locktab [ 504.174973] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 504.200397] gfs2: can't parse mount arguments [ 504.215823] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43, 0x8}], {0x95, 0x0, 0x0, 0x18000000}}, &(0x7f0000000000)='GPL\x00', 0x5, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) dup(r0) r2 = mq_open(&(0x7f0000000000)='eth0\x00', 0x42, 0x0, 0x0) r3 = openat$full(0xffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x10000, 0x0) syz_open_pts(r3, 0x400) r4 = epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000080)) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) epoll_wait(r4, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}, {}], 0x575, 0x89) 20:22:19 executing program 5: sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:19 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='lockproto=lock_n\nlock,locktab']) 20:22:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x48000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 504.477096] gfs2: invalid mount option: locktab [ 504.487284] gfs2: can't parse mount arguments [ 504.499049] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 504.519156] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 504.531193] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:20 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x9101}, 0x700) 20:22:20 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$l2tp6(r0, &(0x7f0000000100)="d4", 0x1, 0x4c8d0, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x1e}}, 0x20) 20:22:20 executing program 5: sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x48010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:20 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='lockproto=lock_n\nlock,locktable']) 20:22:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43, 0x8}], {0x95, 0x0, 0x0, 0x18000000}}, &(0x7f0000000000)='GPL\x00', 0x5, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) dup(r0) r2 = mq_open(&(0x7f0000000000)='eth0\x00', 0x42, 0x0, 0x0) r3 = openat$full(0xffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x10000, 0x0) syz_open_pts(r3, 0x400) r4 = epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000080)) mq_timedsend(r2, 0x0, 0x0, 0x0, 0x0) 20:22:20 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x2, 0x0, 0x7, 0x61}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) [ 505.052235] gfs2: invalid mount option: locktable 20:22:20 executing program 5: sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43, 0x8}], {0x95, 0x0, 0x0, 0x18000000}}, &(0x7f0000000000)='GPL\x00', 0x5, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) dup(r0) r2 = mq_open(&(0x7f0000000000)='eth0\x00', 0x42, 0x0, 0x0) r3 = openat$full(0xffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x10000, 0x0) syz_open_pts(r3, 0x400) r4 = epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r2, &(0x7f0000000080)) [ 505.078345] gfs2: can't parse mount arguments [ 505.080267] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:22:20 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='lockproto=lock_n\nlock,locktable']) [ 505.155083] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43, 0x8}], {0x95, 0x0, 0x0, 0x18000000}}, &(0x7f0000000000)='GPL\x00', 0x5, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) dup(r0) r2 = mq_open(&(0x7f0000000000)='eth0\x00', 0x42, 0x0, 0x0) r3 = openat$full(0xffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x10000, 0x0) syz_open_pts(r3, 0x400) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000080)) 20:22:20 executing program 5: sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) [ 505.201296] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 505.266311] gfs2: invalid mount option: locktable [ 505.276792] gfs2: can't parse mount arguments 20:22:21 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x983a}, 0x700) 20:22:21 executing program 3: socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000ed1000)={0x5, 0x4, 0x3, 0x8000000007}, 0x40) sendmmsg$unix(r0, &(0x7f0000001a40)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001780)=[@rights={{0x10}}], 0x10}], 0x1, 0x0) 20:22:21 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x48020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43, 0x8}], {0x95, 0x0, 0x0, 0x18000000}}, &(0x7f0000000000)='GPL\x00', 0x5, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) dup(r0) r2 = mq_open(&(0x7f0000000000)='eth0\x00', 0x42, 0x0, 0x0) r3 = openat$full(0xffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x10000, 0x0) syz_open_pts(r3, 0x400) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000080)) 20:22:21 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='lockproto=lock_n\nlock,locktable']) 20:22:21 executing program 5: sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:21 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x2c, 0x2, 0x3, 0x401, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2802, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev}}}]}]}, 0x2c}}, 0x0) 20:22:21 executing program 5: sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43, 0x8}], {0x95, 0x0, 0x0, 0x18000000}}, &(0x7f0000000000)='GPL\x00', 0x5, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) dup(r0) r2 = mq_open(&(0x7f0000000000)='eth0\x00', 0x42, 0x0, 0x0) r3 = openat$full(0xffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x10000, 0x0) syz_open_pts(r3, 0x400) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000080)) [ 506.092919] gfs2: invalid mount option: locktable [ 506.121578] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 506.138536] gfs2: can't parse mount arguments [ 506.176445] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:21 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='lockproto=lock_n\nlock,locktable=']) 20:22:21 executing program 3: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x3c, r0, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @udp=r1}]}, 0x3c}}, 0x0) [ 506.224990] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43, 0x8}], {0x95, 0x0, 0x0, 0x18000000}}, &(0x7f0000000000)='GPL\x00', 0x5, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) dup(r0) r2 = mq_open(&(0x7f0000000000)='eth0\x00', 0x42, 0x0, 0x0) openat$full(0xffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x10000, 0x0) r3 = epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000080)) [ 506.404908] gfs2: invalid mount option: locktable= [ 506.434742] gfs2: can't parse mount arguments 20:22:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x989f}, 0x700) 20:22:22 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x48030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:22 executing program 3: io_setup(0x9, &(0x7f0000000340)=0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000240)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 20:22:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43, 0x8}], {0x95, 0x0, 0x0, 0x18000000}}, &(0x7f0000000000)='GPL\x00', 0x5, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) dup(r0) r2 = mq_open(&(0x7f0000000000)='eth0\x00', 0x42, 0x0, 0x0) r3 = epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000080)) 20:22:22 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='lockproto=lock_n\nlock,locktable=']) 20:22:22 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43, 0x8}], {0x95, 0x0, 0x0, 0x18000000}}, &(0x7f0000000000)='GPL\x00', 0x5, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) dup(r0) r2 = epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) [ 506.974699] gfs2: invalid mount option: locktable= [ 506.979667] gfs2: can't parse mount arguments 20:22:22 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:ptmx_t:s0\x00', 0x1c, 0x0) [ 507.038242] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:22:22 executing program 4: syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='lockproto=lock_n\nlock,locktable=']) [ 507.086134] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43, 0x8}], {0x95, 0x0, 0x0, 0x18000000}}, &(0x7f0000000000)='GPL\x00', 0x5, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) dup(r0) r2 = epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) [ 507.148745] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x49000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 507.273107] gfs2: invalid mount option: locktable= [ 507.285298] gfs2: can't parse mount arguments [ 507.381723] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 507.399093] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 507.415060] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x9f98}, 0x700) 20:22:23 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:23 executing program 3: r0 = gettid() rt_sigqueueinfo(r0, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x7}) 20:22:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43, 0x8}], {0x95, 0x0, 0x0, 0x18000000}}, &(0x7f0000000000)='GPL\x00', 0x5, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) dup(r0) r2 = epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) 20:22:23 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000280)={@broadcast, @link_local, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @dev, @dev, @empty, @broadcast}}}}, 0x0) 20:22:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x49010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:23 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x12}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:23 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000100)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "f1438d8b"}}) 20:22:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43, 0x8}], {0x95, 0x0, 0x0, 0x18000000}}, &(0x7f0000000000)='GPL\x00', 0x5, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r0, 0xf502, 0x0) r1 = mq_open(&(0x7f0000000000)='eth0\x00', 0x42, 0x0, 0x0) r2 = epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000080)) 20:22:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f000001d0c0)={0x0, 0x0, &(0x7f000001d080)={&(0x7f00000001c0)={0x20, r1, 0x709, 0x0, 0x0, {}, ["", "", "", "", ""]}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000001780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 507.932339] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 507.977424] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 508.021913] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:23 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x12}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:23 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0xc05c5340, &(0x7f0000000080)) [ 508.063386] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 508.121676] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:22:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xa0c7}, 0x700) 20:22:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x49020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43, 0x8}], {0x95, 0x0, 0x0, 0x18000000}}, &(0x7f0000000000)='GPL\x00', 0x5, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = mq_open(&(0x7f0000000000)='eth0\x00', 0x42, 0x0, 0x0) r1 = epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 20:22:23 executing program 4: syz_emit_ethernet(0x6a, &(0x7f0000000400)={@broadcast, @broadcast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @local, {[@timestamp_addr={0x44, 0x2c, 0x0, 0x1, 0x0, [{@loopback}, {@loopback}, {@private}, {@local}, {}]}]}}}}}}}, 0x0) 20:22:23 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x12}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:23 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_REMOTE={0x8, 0x2, @multicast2}]}}}]}, 0x3c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) 20:22:24 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in, 0x0, 0x32}, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x96}, [@algo_crypt={0x48, 0x2, {{'cbc(des3_ede)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) 20:22:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43, 0x8}], {0x95, 0x0, 0x0, 0x18000000}}, &(0x7f0000000000)='GPL\x00', 0x5, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) r0 = mq_open(&(0x7f0000000000)='eth0\x00', 0x42, 0x0, 0x0) r1 = epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 20:22:24 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[], 0x12}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) [ 508.865250] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 508.920194] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:24 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x8919, &(0x7f0000000240)={'vxcan1\x00', {0x2, 0x0, @multicast1}}) [ 508.966438] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x49030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43, 0x8}], {0x95, 0x0, 0x0, 0x18000000}}, &(0x7f0000000000)='GPL\x00', 0x5, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x74) r0 = mq_open(&(0x7f0000000000)='eth0\x00', 0x42, 0x0, 0x0) r1 = epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) [ 509.247360] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 509.259914] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 509.271888] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xadcc}, 0x700) 20:22:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@setneightbl={0x24, 0x43, 0x601, 0x0, 0x0, {}, [@NDTA_NAME={0xe, 0x1, 'mountinfo\x00'}]}, 0x24}}, 0x0) 20:22:24 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[], 0x12}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:24 executing program 1: r0 = mq_open(&(0x7f0000000000)='eth0\x00', 0x42, 0x0, 0x0) r1 = epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 20:22:24 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[], 0x30}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 20:22:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4a000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:25 executing program 1: r0 = mq_open(0x0, 0x42, 0x0, 0x0) r1 = epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 20:22:25 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) fcntl$addseals(r0, 0x409, 0x5ac8d2e5c3c8406) 20:22:25 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xb419}, 0x700) 20:22:25 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[], 0x12}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x2b10200, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="640000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000300012800c0001006d6163766c616e00200002800a000400aaaaaaaaaaaa0000080001001000000008000300030000000a00050004"], 0x64}}, 0x0) [ 509.814984] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:22:25 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4a010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 509.880605] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 509.890943] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000080)={0x0, 'wg2\x00', {0x1000}}) 20:22:25 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB], 0x12}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:25 executing program 1: r0 = mq_open(0x0, 0x42, 0x0, 0x0) r1 = epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) [ 510.056806] netlink: 'syz-executor.4': attribute type 5 has an invalid length. [ 510.089228] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 20:22:25 executing program 1: r0 = mq_open(0x0, 0x42, 0x0, 0x0) r1 = epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 20:22:25 executing program 4: r0 = syz_open_dev$binderN(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000300)='\"'}) 20:22:25 executing program 3: r0 = getpid() r1 = getpid() kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, 0x0) 20:22:25 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB], 0x12}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) [ 510.116960] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 510.197160] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:25 executing program 1: r0 = mq_open(&(0x7f0000000000)='eth0\x00', 0x0, 0x0, 0x0) r1 = epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) [ 510.254622] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:26 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xb801}, 0x700) 20:22:26 executing program 4: perf_event_open(&(0x7f00000002c0)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fffffffefff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:22:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4a020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:26 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB], 0x12}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:26 executing program 3: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000400)="260000002200470508d258002b1f00eb0101c7033500b000"/38, 0x26) setsockopt$sock_int(r0, 0x1, 0x20800000000008, &(0x7f0000000280), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x20000000, 0x4000000000003, 0x2, @thr={0x0, 0x0}}) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000fd7000)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r1 = gettid() tkill(r1, 0x8001004000000016) 20:22:26 executing program 1: r0 = mq_open(&(0x7f0000000000)='eth0\x00', 0x0, 0x0, 0x0) r1 = epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 20:22:26 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ppoll(&(0x7f0000000200)=[{r0}], 0x1, 0x0, 0x0, 0x0) 20:22:26 executing program 1: r0 = mq_open(&(0x7f0000000000)='eth0\x00', 0x0, 0x0, 0x0) r1 = epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 20:22:26 executing program 1: r0 = mq_open(&(0x7f0000000000)='eth0\x00', 0x0, 0x0, 0x0) r1 = epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) [ 511.001359] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 511.035220] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:26 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="18ed03000000000000"], 0x12}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) [ 511.046644] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4a030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:26 executing program 1: r0 = mq_open(&(0x7f0000000000)='eth0\x00', 0x0, 0x0, 0x0) epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)) [ 511.259333] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 511.287086] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 511.296939] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:27 executing program 1: r0 = mq_open(&(0x7f0000000000)='eth0\x00', 0x0, 0x0, 0x0) epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)) 20:22:27 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="18ed03000000000000"], 0x12}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4b000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:27 executing program 3: keyctl$update(0x2, 0x0, &(0x7f0000000140)="fb", 0x21fff4b0235936c9) 20:22:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xbe01}, 0x700) 20:22:27 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="18ed03000000000000"], 0x12}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:27 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) rt_sigprocmask(0x0, &(0x7f0000000180)={[0xfffffffffffffffb]}, 0x0, 0x8) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_misc(r2, 0x0, 0x5e) splice(r0, 0x0, r1, 0x0, 0x200, 0x0) 20:22:27 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x3}, {0x6, 0x0, 0x0, 0x7ffffff7}]}) 20:22:27 executing program 1: r0 = mq_open(&(0x7f0000000000)='eth0\x00', 0x0, 0x0, 0x0) epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000080)) [ 511.973995] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 512.045305] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 512.081384] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:27 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="18ed0300"/14], 0x12}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4b010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:27 executing program 1: mq_open(&(0x7f0000000000)='eth0\x00', 0x0, 0x0, 0x0) r0 = epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) 20:22:27 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000a40)=[{{&(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000000380)=[@flowinfo={{0x10}}], 0x10}}], 0x2, 0x0) 20:22:27 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="18ed0300"/14], 0x12}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:27 executing program 1: mq_open(&(0x7f0000000000)='eth0\x00', 0x0, 0x0, 0x0) r0 = epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) 20:22:27 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140)='tls\x00', 0x4) setsockopt$inet_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) [ 512.373150] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 512.391115] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 512.418036] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xc7a0}, 0x700) 20:22:28 executing program 1: mq_open(&(0x7f0000000000)='eth0\x00', 0x0, 0x0, 0x0) r0 = epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000080)) 20:22:28 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg$unix(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) 20:22:28 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="18ed0300"/14], 0x12}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000001000000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000013a00)) 20:22:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4b020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:28 executing program 1: r0 = mq_open(&(0x7f0000000000)='eth0\x00', 0x0, 0x0, 0x0) r1 = epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0) 20:22:28 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="18ed03000000000000000000000000d7"], 0x12}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:28 executing program 4: add_key(&(0x7f0000000280)='ceph\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 20:22:28 executing program 1: r0 = mq_open(&(0x7f0000000000)='eth0\x00', 0x0, 0x0, 0x0) r1 = epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0) 20:22:28 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000080)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x18}, [@ldst={0x6, 0x2, 0x3, 0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2}, 0x48) [ 513.041245] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 513.078726] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 513.148710] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4b030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 513.325293] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 513.352232] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 513.366170] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xca01}, 0x700) 20:22:28 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="18ed03000000000000000000000000d7"], 0x12}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:28 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000080)="1f", 0x4000}], 0x1) readv(r0, &(0x7f0000001e40)=[{&(0x7f0000001980)=""/238, 0xee}], 0x1) 20:22:28 executing program 1: r0 = mq_open(&(0x7f0000000000)='eth0\x00', 0x0, 0x0, 0x0) r1 = epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0) 20:22:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x807284, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0x12) 20:22:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4c000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:29 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="18ed03000000000000000000000000d7"], 0x12}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:29 executing program 4: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 20:22:29 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480)='nl80211\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_BEACON(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="b3b200000000000000000e00000028000e"], 0x3c}}, 0x0) [ 513.822736] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 513.836560] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:29 executing program 3: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="3400003a3e0002060000000000000000000000001657f4e34a2068683a6e65742c706f72842c6e657400000005"], 0x1}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c00000009060000000000000000c4f9ac68b002deee00000000000005000100070000002d0007800b001a"], 0x1}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000019001f15b9409b0d1b849ac00200a5780200", 0x16, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="4100000013000100000000000001000007"], 0x1}}, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000000)='E', 0x10a73, 0x4004800, 0x0, 0xffffff7c) [ 513.876469] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4c010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:29 executing program 1: io_setup(0x51, &(0x7f00000004c0)=0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x2}]) [ 514.136632] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 514.167101] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 514.178687] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xcc00}, 0x700) 20:22:29 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="18ed03000000000000000000000000d766"], 0x12}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:29 executing program 4: r0 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) copy_file_range(r0, 0x0, r0, &(0x7f0000000140)=0xfffffffffffffffa, 0x80, 0x0) 20:22:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4c020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:29 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x125d, 0xffffffffffffffff) 20:22:29 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000200)='batadv\x00') sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000440)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000000f00000008000300", @ANYRES32=r1, @ANYBLOB="0500380001000000050038000e00000008003c"], 0x3c}}, 0x0) 20:22:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xccad}, 0x700) 20:22:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0x4}, @IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9, 0x1, 'veth\x00'}, {0x4, 0x2, 0x0, 0x1, @void}}}]}, 0x3c}}, 0x0) 20:22:30 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="18ed03000000000000000000000000d766"], 0x12}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:30 executing program 3: syz_emit_ethernet(0x44e, &(0x7f0000000600)={@local, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "f2f2f1", 0x418, 0x3a, 0xff, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x26, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x2]}, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0xb, "a78c000004ff000053d5dea6b259fe8000000000000023493b87aa0568f00b0d71a8242373244ad2439adc07a7cc69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a803721d"}, {0xff, 0x16, "84f0da1684f0da1313968050378ee824f4dffba6feed320516e05a45c70daf0622c51c7a93e357f7671975afc9c545c59d6137c8ce680ba2d2e8794cc0ee661ab31313a50f67f637326bdc20eee126a2c281295ae9405b24d13dc48b7b6aa26e8a94498418f3472f7281922377d30a3b5ed2c6a2990e5ea6b275c1d5bddf59f3d1843df268e8551f1f8f4723b8c825c6b2cff208dfb5cd8283d0dcd52a6de228bf697d3d6506afec30ef7e07413c7afc1eb139e0"}, {0x0, 0x5e, "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"}]}}}}}}, 0x0) [ 514.774439] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:22:30 executing program 4: r0 = socket(0x2000000000010, 0x80000000002, 0x0) write(r0, &(0x7f0000000140)="410000001a0035f00034009300edfc0e800318000000af000000000008000100480500067f3f000000f334ba332b02eb85ce0000000098b0a0faccc548cc3ca42d", 0x41) [ 514.817678] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 514.876071] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:30 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x0, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, 0x0, &(0x7f0000000900)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x108) 20:22:30 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="18ed03000000000000000000000000d766"], 0x12}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, &(0x7f0000000000)) 20:22:30 executing program 3: syz_emit_ethernet(0x44e, &(0x7f0000000600)={@local, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "f2f2f1", 0x418, 0x3a, 0xff, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x26, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x2]}, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0xb, "a78c000004ff000053d5dea6b259fe8000000000000023493b87aa0568f00b0d71a8242373244ad2439adc07a7cc69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a803721d"}, {0xff, 0x16, "84f0da1684f0da1313968050378ee824f4dffba6feed320516e05a45c70daf0622c51c7a93e357f7671975afc9c545c59d6137c8ce680ba2d2e8794cc0ee661ab31313a50f67f637326bdc20eee126a2c281295ae9405b24d13dc48b7b6aa26e8a94498418f3472f7281922377d30a3b5ed2c6a2990e5ea6b275c1d5bddf59f3d1843df268e8551f1f8f4723b8c825c6b2cff208dfb5cd8283d0dcd52a6de228bf697d3d6506afec30ef7e07413c7afc1eb139e0"}, {0x0, 0x5e, "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"}]}}}}}}, 0x0) 20:22:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4c030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 515.019846] netlink: 29 bytes leftover after parsing attributes in process `syz-executor.4'. 20:22:30 executing program 1: r0 = socket$inet6(0xa, 0x802, 0x73) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f0000000040)=0x105, 0x385) sendmmsg$inet6(r0, &(0x7f0000000780)=[{{&(0x7f0000000080)={0xa, 0x0, 0x69, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=[@flowinfo={{0x14}}, @hopopts={{0x18}}], 0x30}}], 0x1, 0x0) 20:22:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newtaction={0x68, 0x30, 0xffff, 0x0, 0x0, {0x0, 0x0, 0x1300}, [{0x54, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb, 0x1, 'mirred\x00'}, {0xffba, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) 20:22:30 executing program 3: syz_emit_ethernet(0x44e, &(0x7f0000000600)={@local, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "f2f2f1", 0x418, 0x3a, 0xff, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x26, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x2]}, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0xb, "a78c000004ff000053d5dea6b259fe8000000000000023493b87aa0568f00b0d71a8242373244ad2439adc07a7cc69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a803721d"}, {0xff, 0x16, "84f0da1684f0da1313968050378ee824f4dffba6feed320516e05a45c70daf0622c51c7a93e357f7671975afc9c545c59d6137c8ce680ba2d2e8794cc0ee661ab31313a50f67f637326bdc20eee126a2c281295ae9405b24d13dc48b7b6aa26e8a94498418f3472f7281922377d30a3b5ed2c6a2990e5ea6b275c1d5bddf59f3d1843df268e8551f1f8f4723b8c825c6b2cff208dfb5cd8283d0dcd52a6de228bf697d3d6506afec30ef7e07413c7afc1eb139e0"}, {0x0, 0x5e, "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"}]}}}}}}, 0x0) [ 515.195204] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 515.206011] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 515.217404] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 515.276128] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.4'. 20:22:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xcd00}, 0x700) 20:22:30 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="18ed03000000000000000000000000d76637"], 0x12}}], 0x40000000000026d, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, 0x0) 20:22:30 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000000c0)) ioctl$PPPIOCSACTIVE(r0, 0x8008743f, &(0x7f0000000040)={0x0, 0x0}) 20:22:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4d000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:30 executing program 3: syz_emit_ethernet(0x44e, &(0x7f0000000600)={@local, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "f2f2f1", 0x418, 0x3a, 0xff, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x26, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x2]}, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0xb, "a78c000004ff000053d5dea6b259fe8000000000000023493b87aa0568f00b0d71a8242373244ad2439adc07a7cc69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a803721d"}, {0xff, 0x16, "84f0da1684f0da1313968050378ee824f4dffba6feed320516e05a45c70daf0622c51c7a93e357f7671975afc9c545c59d6137c8ce680ba2d2e8794cc0ee661ab31313a50f67f637326bdc20eee126a2c281295ae9405b24d13dc48b7b6aa26e8a94498418f3472f7281922377d30a3b5ed2c6a2990e5ea6b275c1d5bddf59f3d1843df268e8551f1f8f4723b8c825c6b2cff208dfb5cd8283d0dcd52a6de228bf697d3d6506afec30ef7e07413c7afc1eb139e0"}, {0x0, 0x5e, "062bf7b5e0f2dbbdc849b90d4e80a0e3f7af088060d01a1cfcfad88ef4512c6ef5c0ead4b9cc87484b106a060a9899d50f595204418f51e91480b395741dd314136a262cadf02b071d88e61703f037caded0b315701274012fa532ddd69499074e1a2df196e0afcffd928fb3d82ab8160253a47d3efc3d7cead55c28610ae20f69aaced0a1a6ce815344cf8d0bc8a0dfcdd1e8cd7242601777ec653c2d4b704397dcb1350982afd017eaa630c840d71589499fd68239ae0c0aa2fc9b949d1a716d40a24f078e92e8c268ff726290944b5f3a3bea9559f2d2a51405fba224411ecc49544dea47917a98bf79c3c8eed70429abf70a52ecbda21c9bf0f6a70cd2c2c887391e4095ad223437c60abf829447b47bd231ca2a98d9da7519a4bd28e803fa000fafc0dc453ed56cdf4356d7abcfec4eed0b94a4f78ce44a7177c6684026bb4f26a17e52e326c8bb7be5e2ea5780d7169d8f4ff62cb2b223f1d6221f62e0ee0244d86042560edd36853c464b23be536c65b87cd5ea60932ed90607b369ed2017f645afcb5cd07f6896a08473bd5dea2bfb52ac501a39c338ede985aa4a7755db876cc1558aac15ad4d6c078834be4d944f3cce006cd2ad9ba8d17f01a614052aadbd4af0fd282f594dc4530ee49b6c9ae6d5d80a073e678594be2e2f0869baa2a58dd2d0f6a995fb706c4d1b618d57da1c2d8f55611f746105a947b4f6bb74dbdbffb1b3c1f2316f6a28a07f0145b1bf8345b6aa4e9d5a819497856792121219ea151c1f8e2f86356039bc5b87fe4cad68b6afa08687e6e751803865165eac0c34bdddae1bbe52f55d08cc4a0865f8df372635e8a26ac4ac9716a124ac4e83349f17b612e2b1893b5eaccecc7d812bb4f4fc6b313f57c2035a90f782a4a97b5f5309b6c5798d72b9187f3d411e84041e3671fe35e39fa1887846721c38d501b471990b919d2ad9ca9bc71157a843d75838c0aa4ff0dabd74284709f1f87f324ec4f56eacd70e6bb5e9677e719786c4d4284e4c1904bd0566ca1a1fbfd602d9d91c223c69cca535f3f6afa4290a1ac2b11fc57e"}]}}}}}}, 0x0) 20:22:30 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5, 0x77}}, &(0x7f0000000080)='GPL\x00', 0x4, 0x99, &(0x7f0000000340)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 20:22:31 executing program 1: r0 = socket(0x40000000002, 0x3, 0x2) sendmsg$tipc(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x2000c045) 20:22:31 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="18ed03000000000000000000000000d76637"], 0x12}}], 0x40000000000026d, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, 0x0) 20:22:31 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 20:22:31 executing program 4: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000000)='U', 0x1, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) r3 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000780)="01", 0x1, r3) r5 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f00000004c0)={r1, r5, r4}, &(0x7f0000000540)=""/232, 0xe8, &(0x7f0000000480)={&(0x7f0000000240)={'wp256-generic\x00'}}) [ 515.867157] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:22:31 executing program 1: syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='time_offset=-']) [ 515.917508] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 515.955323] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:31 executing program 4: r0 = socket(0x40000000002, 0x3, 0x2) unshare(0x40600) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000012c0)='syz_tun\x00', 0xd4) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 20:22:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xd027}, 0x700) 20:22:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4d010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:31 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 20:22:31 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="18ed03000000000000000000000000d76637"], 0x12}}], 0x40000000000026d, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, 0x0) 20:22:31 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpgrp(0x0) r2 = getpgrp(0x0) r3 = epoll_create(0x5) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000080)={r3}) 20:22:31 executing program 4: syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x0, 0x0) 20:22:32 executing program 1: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newnexthop={0x18, 0x64, 0x3}, 0x18}}, 0x0) 20:22:32 executing program 3: syz_emit_ethernet(0x0, 0x0, 0x0) 20:22:32 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_WKALM_SET(r0, 0xc0189436, 0x0) 20:22:32 executing program 5: sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="c1000000", @ANYRES16=0x0, @ANYBLOB="0000000000000000000001080000c80008809a3d008014000406000000007f00000199afbbdcd5bc7965080003000000000074000000200004000a000000000000000000000000000000000000000000000040000000240002002cae60f5dd0570bbf48bf233fba1a9b017538688b5095343e13f2c7be6c565a824000100bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbcbbbbbbbbbbbbbbbbbbbbbbbbbba906000500000000003000008024000100e0e9ffffa9aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa0800030001"], 0x3}}, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000129001f4d154a837393278bff0c80a57802000000000484001403", 0x1e, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="130000ee30001f00040004eb1b849ad502", 0x11, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="c9ae00001a", 0x5, 0x0, 0x0, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) [ 516.826409] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:22:32 executing program 3: syz_emit_ethernet(0x44e, &(0x7f0000000600)={@local, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "f2f2f1", 0x418, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x26, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x2]}, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0xb, "a78c000004ff000053d5dea6b259fe8000000000000023493b87aa0568f00b0d71a8242373244ad2439adc07a7cc69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a803721d"}, {0xff, 0x16, "84f0da1684f0da1313968050378ee824f4dffba6feed320516e05a45c70daf0622c51c7a93e357f7671975afc9c545c59d6137c8ce680ba2d2e8794cc0ee661ab31313a50f67f637326bdc20eee126a2c281295ae9405b24d13dc48b7b6aa26e8a94498418f3472f7281922377d30a3b5ed2c6a2990e5ea6b275c1d5bddf59f3d1843df268e8551f1f8f4723b8c825c6b2cff208dfb5cd8283d0dcd52a6de228bf697d3d6506afec30ef7e07413c7afc1eb139e0"}, {0x0, 0x5e, "062bf7b5e0f2dbbdc849b90d4e80a0e3f7af088060d01a1cfcfad88ef4512c6ef5c0ead4b9cc87484b106a060a9899d50f595204418f51e91480b395741dd314136a262cadf02b071d88e61703f037caded0b315701274012fa532ddd69499074e1a2df196e0afcffd928fb3d82ab8160253a47d3efc3d7cead55c28610ae20f69aaced0a1a6ce815344cf8d0bc8a0dfcdd1e8cd7242601777ec653c2d4b704397dcb1350982afd017eaa630c840d71589499fd68239ae0c0aa2fc9b949d1a716d40a24f078e92e8c268ff726290944b5f3a3bea9559f2d2a51405fba224411ecc49544dea47917a98bf79c3c8eed70429abf70a52ecbda21c9bf0f6a70cd2c2c887391e4095ad223437c60abf829447b47bd231ca2a98d9da7519a4bd28e803fa000fafc0dc453ed56cdf4356d7abcfec4eed0b94a4f78ce44a7177c6684026bb4f26a17e52e326c8bb7be5e2ea5780d7169d8f4ff62cb2b223f1d6221f62e0ee0244d86042560edd36853c464b23be536c65b87cd5ea60932ed90607b369ed2017f645afcb5cd07f6896a08473bd5dea2bfb52ac501a39c338ede985aa4a7755db876cc1558aac15ad4d6c078834be4d944f3cce006cd2ad9ba8d17f01a614052aadbd4af0fd282f594dc4530ee49b6c9ae6d5d80a073e678594be2e2f0869baa2a58dd2d0f6a995fb706c4d1b618d57da1c2d8f55611f746105a947b4f6bb74dbdbffb1b3c1f2316f6a28a07f0145b1bf8345b6aa4e9d5a819497856792121219ea151c1f8e2f86356039bc5b87fe4cad68b6afa08687e6e751803865165eac0c34bdddae1bbe52f55d08cc4a0865f8df372635e8a26ac4ac9716a124ac4e83349f17b612e2b1893b5eaccecc7d812bb4f4fc6b313f57c2035a90f782a4a97b5f5309b6c5798d72b9187f3d411e84041e3671fe35e39fa1887846721c38d501b471990b919d2ad9ca9bc71157a843d75838c0aa4ff0dabd74284709f1f87f324ec4f56eacd70e6bb5e9677e719786c4d4284e4c1904bd0566ca1a1fbfd602d9d91c223c69cca535f3f6afa4290a1ac2b11fc57e"}]}}}}}}, 0x0) 20:22:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'veth1_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="7c0000002400697c980900000000000000002000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000900010067726564000000004c000200080005000000000008000500000000003800030005"], 0x7c}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x5, &(0x7f0000000100)}], 0x492492492492642, 0x0) [ 516.911563] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 516.930448] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 517.026050] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 517.036886] netlink: 43799 bytes leftover after parsing attributes in process `syz-executor.5'. 20:22:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xd04f}, 0x700) 20:22:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4d020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:32 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'erspan0\x00', 0x0}) sendto$packet(r0, &(0x7f0000000080)="926048da7ed23f555bcb22000800", 0xe, 0x0, &(0x7f00000001c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) 20:22:32 executing program 3: syz_emit_ethernet(0x157, &(0x7f0000000600)={@local, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "f2f2f1", 0x121, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x26, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x2]}, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0xb, "a78c000004ff000053d5dea6b259fe8000000000000023493b87aa0568f00b0d71a8242373244ad2439adc07a7cc69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a803721d"}, {0xff, 0x16, "84f0da1684f0da1313968050378ee824f4dffba6feed320516e05a45c70daf0622c51c7a93e357f7671975afc9c545c59d6137c8ce680ba2d2e8794cc0ee661ab31313a50f67f637326bdc20eee126a2c281295ae9405b24d13dc48b7b6aa26e8a94498418f3472f7281922377d30a3b5ed2c6a2990e5ea6b275c1d5bddf59f3d1843df268e8551f1f8f4723b8c825c6b2cff208dfb5cd8283d0dcd52a6de228bf697d3d6506afec30ef7e07413c7afc1eb139e0"}]}}}}}}, 0x0) 20:22:32 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stack\x00') read$FUSE(r0, 0x0, 0x0) 20:22:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000fa8000)="2700000012000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 20:22:33 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x9}, 0x14) 20:22:33 executing program 3: syz_emit_ethernet(0xa1, &(0x7f0000000600)={@local, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "f2f2f1", 0x6b, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x26, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x2]}, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0xb, "a78c000004ff000053d5dea6b259fe8000000000000023493b87aa0568f00b0d71a8242373244ad2439adc07a7cc69748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c11b37adac15084dbaf736b41e5a803721d"}]}}}}}}, 0x0) 20:22:33 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, 0x0, &(0x7f0000000000)) [ 517.777970] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:22:33 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000180)="93", 0x1}], 0x1) [ 517.863676] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 517.910282] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:33 executing program 3: syz_emit_ethernet(0x46, &(0x7f0000000600)={@local, @broadcast, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "f2f2f1", 0x10, 0x3a, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x26, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x2]}, @mcast2, {[], @ndisc_ra}}}}}, 0x0) 20:22:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4d030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 518.148913] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 518.165113] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 518.189028] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xd100}, 0x700) 20:22:33 executing program 5: set_robust_list(0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000340)='\x00', 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 20:22:33 executing program 4: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_nanosleep(0x8, 0x0, &(0x7f0000000280)={0x0, r1+10000000}, &(0x7f00000002c0)) 20:22:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000036000511d25a80648c63940d0124fc60100035400a0002000200000037153e370400018004000e00d1bd", 0x2e}], 0x1}, 0x0) 20:22:33 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000240)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x0, @loopback}, r1}}, 0x30) 20:22:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4e000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 518.690315] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:22:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b61, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000040)="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"}) [ 518.730457] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.1'. [ 518.739491] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 518.779835] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:34 executing program 4: socket$kcm(0x2, 0x20000000002, 0x73) r0 = socket$kcm(0x2, 0x2, 0x73) close(r0) 20:22:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x6c, 0x30, 0x1, 0x0, 0x0, {}, [{0x58, 0x1, [@m_ife={0x54, 0x1, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{}, 0x1}}, @TCA_IFE_SMAC={0xa, 0x4, @local}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x6c}}, 0x0) 20:22:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=@newtaction={0x48, 0x30, 0x3ed, 0x0, 0x0, {}, [{0x34, 0x1, [@m_skbedit={0x30, 0x1, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) 20:22:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4e010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:34 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x0, 0x0) select(0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="25bca274769e620a2734fa0095e0612687ecb86a548802a902000000000000004e2f98b579a782d2250000000206e73ba8f4952bedc6760253ef", 0xff9a, 0x400}], 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="646174613d6a6f75726e616c2c00ce8b8d7a2571ec81dc645238cd2a83409944b6f446c1a4afee0f9c91c2407c4b961357b66efd36364635c07bbe323eeb01d94bd92025078a5d972e4271f871a15d5f10dee4dc680375addbeffc7960fc2a2f943f98711121f100"/115]) [ 519.020083] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 519.035495] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 519.054571] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 519.125667] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 519.144972] EXT4-fs (loop4): Couldn't mount because of unsupported optional features (1) 20:22:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xd500}, 0x700) 20:22:34 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0xce, 0x0, &(0x7f0000000040)) 20:22:34 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) 20:22:34 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4e020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:34 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x44}}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000075, 0x0) 20:22:34 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000006900030800030000a903fb7f000000000000000008000100d7"], 0x20}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) 20:22:34 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) sendmmsg$inet(r0, &(0x7f00000032c0)=[{{&(0x7f0000000040)={0x2, 0x4e22, @empty}, 0x10, 0x0}}, {{&(0x7f0000002540)={0x2, 0x4e23}, 0x10, 0x0, 0x0, &(0x7f0000002680)=[@ip_retopts={{0x10, 0x11}}], 0x10}}], 0x2, 0x0) [ 519.649332] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 519.688781] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 519.731821] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:35 executing program 1: r0 = socket(0x23, 0x5, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000440)) 20:22:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4e030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 519.777780] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=105 sclass=netlink_route_socket pid=1776 comm=syz-executor.3 20:22:35 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x44}}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000075, 0x0) [ 519.847594] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=105 sclass=netlink_route_socket pid=1786 comm=syz-executor.3 [ 519.871423] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended 20:22:35 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) sendmsg$can_bcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x4, 0x0, 0x0, {}, {}, {}, 0x8, @can={{}, 0x0, 0x0, 0x0, 0x0, "182f49dc3a8494d8"}}, 0x48}}, 0x0) [ 519.898992] EXT4-fs (loop4): Couldn't mount because of unsupported optional features (1) 20:22:35 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000f36000)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300090c000000ffffffffffffffff02001300020000000000000000000000030006000000000002004e20e0000001010000000000000002000100f8beffff0000000200010000030005000000000002"], 0x60}}, 0x0) sendmsg$key(r0, &(0x7f000033efc8)={0x0, 0xffffff7f, &(0x7f0000aa8000)={&(0x7f00009b9000)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 520.051585] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 520.078101] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 520.092633] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:35 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xdc02}, 0x700) 20:22:35 executing program 4: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir'}, 0x5c}], [], 0xf603000000000000}) 20:22:35 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000bf0000000f00000001000000000000000000000000200000002000002000000029c4645f29c4645f0100ffff53ef01000100000029c4645f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010d00)="ed4100000004000029c4645f29c4645f29c4645f000000000000040002000000000000000500000025", 0x29, 0x1800}, {&(0x7f0000011100)="ed4100000004000029c4645f29c4645f29c4645f00000000000002", 0x1b, 0x4000}, {&(0x7f0000011700)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c6530", 0x39, 0x9400}, {0x0, 0x0, 0x3fc00}], 0x0, &(0x7f0000000140)=ANY=[]) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) unlinkat(r0, &(0x7f0000000100)='./file0\x00', 0x200) 20:22:35 executing program 3: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0xfffffffe) 20:22:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4f000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:35 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x44}}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000075, 0x0) [ 520.492884] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:22:35 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) [ 520.534937] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 520.565154] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 520.595477] overlayfs: empty lowerdir 20:22:35 executing program 3: r0 = timerfd_create(0x0, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x3}) 20:22:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7f}) write$cgroup_int(r0, &(0x7f0000000380), 0x101bf) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) 20:22:35 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4f010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:35 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x44}}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000075, 0x0) 20:22:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x3c1, 0x3, 0x308, 0x0, 0x0, 0x148, 0x0, 0x0, 0x238, 0x238, 0x238, 0x238, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x100, 0x148, 0x0, {}, [@common=@inet=@ecn={{0x28, 'ecn\x00'}}, @common=@inet=@tcp={{0x30, 'tcp\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x3, 'syz1\x00'}}}, {{@ipv6={@mcast1, @loopback, [], [], 'veth0_to_bond\x00', 'batadv_slave_1\x00'}, 0x0, 0xa8, 0xf0}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6e9, 'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x368) [ 520.854172] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 520.887430] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 520.912902] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xdc77}, 0x700) 20:22:36 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xa, 0x2, 0x4, 0x4, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000340), &(0x7f0000000400)}, 0x20) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100)=0xfffffffffffffffe, 0x112) 20:22:36 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, 0x0) 20:22:36 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:22:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4f020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:36 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x44}}, 0x10) 20:22:36 executing program 4: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000140)="1c0000001a003b9b301f0000000000000000000000000000a1aeaf7a", 0x1c) 20:22:36 executing program 1: signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x1800) [ 521.505995] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:22:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x7, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1b, 0x4}, [@call={0x67}]}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0xc6, &(0x7f00000002c0)=""/166, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8}, 0x3f) [ 521.583438] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:36 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x44}}, 0x10) 20:22:36 executing program 1: pipe(&(0x7f0000000100)) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}]}}}, @IFLA_LINK={0x8, 0x5, r2}]}, 0x4c}}, 0x0) 20:22:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5, 0x5c}}, &(0x7f0000014ff5)='GPL\x00', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) [ 521.625955] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xe027}, 0x700) 20:22:37 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000040)={{0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}) 20:22:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x4f030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:37 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r0, 0x10, &(0x7f0000000040)={0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=r1, 0x4) 20:22:37 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x44}}, 0x10) 20:22:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000001c80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2}}, @union]}}, &(0x7f0000000340)=""/142, 0x3e, 0x8e, 0x8}, 0x20) 20:22:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000680)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r1, 0x1, 0x0, 0x0, {{}, {}, {0x8, 0x2, 0x1}}}, 0x24}}, 0x0) 20:22:37 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0xa, &(0x7f0000000140)=0x3, 0x4) 20:22:37 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x44}}, 0x10) [ 522.424879] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 522.457322] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:37 executing program 3: r0 = socket$inet(0x2, 0x4000000805, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000040)={0x0, @empty, 0x4e20, 0x0, 'lblc\x00'}, 0x2c) [ 522.506476] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:37 executing program 5: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='ip_vti0\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x44}}, 0x10) 20:22:37 executing program 4: syz_emit_ethernet(0x22, &(0x7f00000000c0)={@random="a31cae5a35ca", @random="e520a6011c0a", @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @empty}}}}}, 0x0) [ 522.638570] IPVS: set_ctl: invalid protocol: 0 0.0.0.0:20000 20:22:38 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xe416}, 0x700) 20:22:38 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x50000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:38 executing program 1: pipe(&(0x7f0000000200)) socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) socketpair(0x29, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) bind$llc(r1, &(0x7f0000000100)={0x1a, 0x10e, 0x2, 0x1f, 0xd4, 0xf9, @remote}, 0x10) connect$llc(r0, &(0x7f00000000c0)={0x1a, 0x10e, 0x7, 0x1, 0x36, 0x7e, @broadcast}, 0x10) bind$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x0, 0x1f, 0x0, 0x0, 0x23}, 0x10) r2 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0xc, &(0x7f0000dc6ffe), &(0x7f0000904000)=0x4) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000000080), 0x10, &(0x7f00000002c0)={0x0}}, 0x20000801) 20:22:38 executing program 4: r0 = fanotify_init(0x0, 0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) fanotify_mark(r0, 0x9, 0x48000020, r1, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 20:22:38 executing program 5: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='ip_vti0\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x44}}, 0x10) 20:22:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x14, r1, 0x4bf760667fd1b0d3}, 0x14}}, 0x0) 20:22:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r3, 0x0) 20:22:38 executing program 1: set_mempolicy(0x2, &(0x7f0000000080)=0x7fff, 0x3) r0 = memfd_create(&(0x7f0000000200)='/dev/\"\x00\x00\x00\x00\x00\x00\x00\xe8\x00\xeb\xf5z\x98\x00\xc8\x8d\x93\a\x8a\x8bYd>\x7f\xbek\x7fN\x1e\xdf\xf89_\xad\x8fv\x80\xab!S\xe8\xe1\x05.!N<\x8e\xe2sNL\\\xc0\xe7ZX\x8d\xddx\xc6\xb6P\x1d\xfd\x90\xd1l@.{\x1cB\xd5Feb\xd5\xb7V\x8dX\x10_p)\xba|7\xa4\xbb\xfb\xd62(\x92\\\xc3j\x870\xe5\x8c.\x955,`=\xdca\xda\x96)\xb8\x9f\x15\xb7\xfa\x0f\xfeA\x02Y%j\x04n\xe3\xa0\x03\xde\xd5\xfb\xb8\xdc\x18`\xd1S\x81\x88\xf9J~\x9d!\xbcw\xf6\xfb\xe3\xd1T\xd8\x9ft\x00\xd2\xaf\x00[\xbe\x89\n\x14\xa3\x83\x13i\xed\xe2\x92\xa8\x10\x80O\xaaw\xf7[\x7fY\xd4\xde\xd6\xea\x16#\xe4\x9e\x86j\x9c\xa3N\xde\xa3\x15DwY\x8e\xbf\x12\xdc\x19$5zf\x98V\x1aj\xd3\xc42\x06\xab\x98\xe3\x97FF\x1f\xce\xfe\xec\xb2-\xfe\xbd\xc6\xbb\xc6\x85\xd1\x84\x0eD\x7f\x12\xf7\x19\xd0N\xd1\xc4:\xb5\xae\x93\x8f\x8c\xe7H\x8d\xb2\x9c\xd1\x1f\xc6\xce\xb7\xb5(\x8dC$~\t0l\x91p\xba\xe8[\xb7U\a!\x11\x14M\x1f\xe0?X\v\x94\xd8\xfa\xcc\xfe\xe8\xbe\xe4\xc6\xc5(=\xafVD6BR\xfd\x97P\xd7nD\xcf\xba\xc4\x91t\x80\x83\x95\'\xd9\x01\x80\xcd\xb7w\xc1\x17m3\xa7\xeah\xd1\x91\xac\x0e\xfc\xd7{Sw\xac-\x81\xa5\x1e\\\x10\xe2\xde\xb9\xe9j9\xf9\xc6*-/\xa0\x8b\xb8T\x16\xccR\x96i\x05}=2.\xae\xb0\xec\xb3\xc2\xacu\x96/\xe8\xc8\x0eP#\x86\xf3nh\xe7\x9b\xeeI\x06\x9a\x81\xb0\xfam\xbd\xb0u', 0x0) ftruncate(r0, 0x1000000) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000080)=0x2e, 0x14c) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendfile(r1, r0, 0x0, 0xeefffdeb) [ 523.480638] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 523.493491] audit: type=1804 audit(1603311758.729:39): pid=1968 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir841165903/syzkaller.Mnbeur/1147/file0" dev="sda1" ino=15768 res=1 20:22:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000bc0)={'wg0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=@ipv4_deladdr={0x2c, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_LABEL={0x14, 0x3, 'veth0_to_bridge\x00'}]}, 0x2c}}, 0x0) 20:22:38 executing program 5: setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='ip_vti0\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x44}}, 0x10) [ 523.555784] audit: type=1804 audit(1603311758.769:40): pid=1968 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir841165903/syzkaller.Mnbeur/1147/file0" dev="sda1" ino=15768 res=1 [ 523.588123] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 523.611308] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:38 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000006c0)={0x54, 0x13, 0x591, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x8, 0x1, "09fa0304"}]}, 0x54}}, 0x0) 20:22:38 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x49, 0x0, &(0x7f00000001c0)) 20:22:39 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xe701}, 0x700) 20:22:39 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x50010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:39 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x44}}, 0x10) 20:22:39 executing program 4: pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000600)=[{&(0x7f0000000000)="9e", 0x1}], 0x1, 0x0) splice(r1, 0x0, r0, 0x0, 0x1, 0x0) 20:22:39 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000000)) 20:22:39 executing program 1: syz_emit_ethernet(0x68, &(0x7f0000000a80)={@broadcast, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "e5f701", 0x32, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_redir={0x89, 0x0, 0x0, [], @empty={[0x21]}, @loopback, [{0x0, 0x1, "4af5ed2889818240"}]}}}}}}, 0x0) 20:22:39 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x44}}, 0x10) 20:22:39 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) [ 524.314424] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:22:39 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:39 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000004c0)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) readlink(0x0, 0x0, 0x0) 20:22:39 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000180)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x44}}, 0x10) [ 524.398567] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 524.433102] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:39 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'veth0_to_bond\x00', &(0x7f0000000180)=@ethtool_eeprom={0x5}}) 20:22:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xe803}, 0x700) 20:22:40 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x50020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:40 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x10, 0x0, &(0x7f0000000100)) 20:22:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x44}}, 0x10) 20:22:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpgrp(0x0) r2 = getpgrp(0x0) r3 = epoll_create(0x1) r4 = epoll_create(0x5) r5 = socket(0x28, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000000)) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000080)={r4}) [ 525.138007] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 525.147085] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 525.167157] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:40 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000000c0)={0x7, @raw_data="bda72286ade0d9a1ceb4277e0a8f3092f3732309ee161c7b5a756cecf6269060160fcffc2347cb01b0dc2fcba41e8c44d4dff32aed136f232443f911b7f811bdca8f97b2d2f449e6bd4c82a0f6fa923be68c3ed8661348b067a8560e3155873c1139289496e841312832b21ac63de3afd31d21d41ff76476a8d08d8a345c2f840dc286aa4248be7dc2976a02fead32eb7a5eaf4156fe0357d5efb2598cd56b5094383d53ce0655bb79c32fb1f4e9cbd8455a51bc637f69d3b83dcd2be32c369cd5d6167d1169cb96"}) 20:22:40 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x50030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x44}}, 0x10) 20:22:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x80108906, 0x0) 20:22:40 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x44}}, 0x10) [ 525.409846] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 525.421302] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 525.439314] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xe827}, 0x700) 20:22:41 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0201a9ffffff0a000000ff45ac0480ffffffbf00e931190000000000002000ffffff82000000e100e2ff87770072003007006300000000000000008000da55aa", 0x40, 0x1c0}]) 20:22:41 executing program 4: syz_read_part_table(0x0, 0x2, &(0x7f0000001340)=[{0x0, 0x0, 0xddee}, {&(0x7f0000000340)="e06208a30df71a39f3bd0d42806ee541c69ce478ae425779f4e4196e451885dc4d700a3d00184c1cbdaa8eba3b0b1d6c01ec5e2255468cbd65f1adf567188816553705a4bd07e7a5d4caf079fd8554ba6c4ea001fa7958a4340c01f9717b4ef6e47026206ef07036b58043a79b651c5060705ca59bc6f90436eb595c179c92880dce19b42d816f8a359c08695345045c44b5fa56772ea28edfd95afbd0bb6695e024adf4f02e28650168fbd7dbf4b3ce102b01ec0bd422d96a3e32e6bbbb3b45e9d0ee44b00246980398dc13def05ec964fed9200dc47843a3b33fe7d3b91e9c2b5312118d124e5155e9ec3afe29fb877fbd29cc4cd92aac2bc1523ab366855702108330447eb38e99c161a0c52cb8b0ccb3ac2256592f69b1bafa9306f878dc91c54414b0d21a89f1b20a667b0dba6f6e356d9f392fe242092633ce585574ebbf7cc28fc0732e8994e42d9d1d75bbc72ad1ee3a90dd7c738b306b631706f5933657a7ec3a63e9721397e83bedd86a858eff25a00b86ea3c3dd459718527e36255f049f0c93367eeb6b01b1cbbd86e3a0189627e54b1eb736a3eeb783746b0f393924cd8d661470c8c431165b29b2cce20ac61d9c2e8a6f5b85deff7bfa0b2e86505ec0c0b04bdf8a45143695c4bbc453f2e7480673aae63e85a95e980eb2aa4edc5b6b895d319f12ef42dab233c8a038192bc193128d50f4b56ca419aed89eb30cb4ff95b2286698ff9f708698eab9248fe70d0be5bd6bcddb64527e1b60c0f3bbae0a682cd10ebde8f0f3ab124a73f0cfd7e4ad35a2b841cbfb2717a3b43df6ead2f25be3d2fe2e2e9bf2bf9111b50b92fb22c98afd946fa61b7e322299a9b2a3274fc31aa166f309972ebd1fc47bb301acf552f91dddd572c052e5472b5b8f6993c26b957a2a7e7cc8e957ca294e54eb3139f3755f1cce064a5823444efc472072d1f853c57bf3e5bb7e8fe8b011d41349346522e057c198e3d83e00191113f47ccd0c9331f5c75fc058a5ddcf11358c2ab87d30408f3e3fdae5b05efd4ca1359e2a202d7c5e3fff1c4e82f84486f59e81c2de63761f8ca88effd668ad26b272f87ac475a8ed677462ea6354ebb991631b75bcd7dfcf1a8c2e0b3c4a4d49462374220d305f3d955b9c923184080700d15dbee6bfa10b39e1d77e2f4cfc0d3921e0e0b5c21ac806e08f9b19b76c2c29d987a7bffe8ea5aa3342372917e681e603d5ff6ab4b3d72085c017d0fdbd9664fd654cb556114c8292b2d79e34ad9d881742f7f28491bcf8f6192813c0ee224ee633976559b9aacce1a9ae7eaf18e53611143d31265de86b10e01c3f8ef0b19966041befd01afe3efa9becfeef41f3774e920ceaa3ba1181302c92a5b4b87201165e7d756b46f5c30cf6d8bb2403f4604a2b374bb3af3bfa3fe1969347429d55376d73753ed4b3021ea6afb2fdf78db01a5c1f28f2d44ee3bdceda2999358f21889084a95ee4f4634673eee46e836219f033ec35f8b75a043eb2b3cff80ea13c3d6b7aa5a8168dc34eaa34a0f43e56e36c4cd70c184eb3ea8cbc99b1f7ed242664f3840343130f7d7384a949e2462f38dec91d59e855279549b3d8c013c10b11cd10e1e5281081b284d83e3331cea1521307dd798664cf3583866de9d8b89e5d500be02da53cd378e42d30dbc7fed51d21d89f7b4857e7c958d4593f906424882143ddb83ebabd9e869f124ec928b354c0a5c73691470e07c629590cb35b04f52443f4f5f8718f84419311d9c10047dba4e8ba02ef95b5628be64ea2d46258dfa1741eac9ad07d42349804eae23389bdc81965c74abad898bd9d2688730fdba0f95ec132195a95e7c785fcea32ba59839e459d27db44ac54239f29bcb37fb8fe44a8b11c8687e599df147302bd34bfd6da678ba811f6567cef8d2d2ce57b23e5652f1b3a8237db6c797c92f25f1eafa72edfb7f9bc307a83e05de80e35abe792445475f539a77fa3b344f0131d5d172e85ff1e123465a5dd5f2719b24b38df82afc1ee8d1a81aea10cf1b5aad5e5f1c04e40c1b2386d43c4088f36e847f428bea4c9988e09ee022b1b900d7116224a385e20ae827c15eb335eae601ffc6f9db0ca1d5b2d47ddc990ba9db79dba40d31c481c367987b57a85ad79b6d2b7f34f3e1f3c5e03cc9a52971c2a64edbbc9a879e3dea5350a834b8e3240d783db93dcefc1e3f935e238e9d324aa8c05ca66871a32f63964fc2adbc6045a2ba1a2a4cb6fd20bcb086ec117a94b0c4a4dc0a7dff3198bf464cbc272257b75b7ba455a99e7444decca8cc50875238f402b24733b4e4184581e1ed11b992b43a63c37ee302837a37916eea093c107df425681a7c5d7c6209a7eac83bbae666714e811ce99549a0094c628c238f47783c81de0922c3bcf76ce06dbde6c2b5da6a3ad980a1c56b3c25414c547eab748b1d9293e672d0777b22370e321734bdee4601132113417493005d6a2fdc8701b9cd191deadb1a0b89786e19207034d2728779046489e33282849ebb65b3e5eb2ee558ed19d006106aeb7966ba453bb7b7559f541d041d9bdc186e3ffb811c21d448f90bc9ef89d95991a9a7ce030a00c7db74f60cf6bbb5e27fc31e68bbf2d691633fcb1fa7060588c1eba9e2433939f89af2eb01987816738288f453904a6bd8050a9fddf085200aa152775555db6124a07c32af01434ad02c66168a4b8e32f283dd8e68161de6dd4db445b8b04c750218bf5c64aa60a80774d10f6922d9ac2d979c22cd19563cc25a8b6cc8f4f1881a4a0bd991477816aeab1504eb74ad5a7f09902bc37b13b267bbc00454fdbdb1530b00ed525f9715bfdb75d2852d52690def78d7e594fba0657424a3c58cb1797355f1cdaae206162a724a16330a8104eecc35d764808ec73f9da8258fa1f36ddf9d69d72fa4ba53a9f3cb1746ddf6f4b78f670179c089ffa6c53f2f9eafb60607d648c004a4fb2aaf0b652784680fb4db40b618033eba3d794a173f751116ca71ff8ebf001288faca69fdb44f0cb5fcdf4775ae858937b501c6d330280b746f785143c3ddaceda4609eff7506f3882609e5fd239a20a572ad677b29c447acd4d4ac9e07da1f143ea38ed4a1563344fd3aa7f4cada63dbf9674ec08e368b799008a83cf1cb6b8d9b1a8f0257bc4f462a7c1cfc520c462c915b2f8c0216a4076294e2cd0e0fc5ff8eeaf82aab0e900d3aa679741b69b0dbfa1f66c63e0e4013b9da5c7194c07ade9baab2d7b1c754d42ab6f434fbef6e9efd830be008fdf5c05b6f28a5b67829eccaec80eafda43b167f8a7230504aff1c3675e101fe2f7a9ae53ab8a38814ba351d00032f6e0b25b16fd421f3329c1eb085a31d258697b93a813c54451aa2e6713dc118057df25bfc44afc9eca88f0723f3e544cfb8f98ac36c527f9c93b2a22413cd7006ceb2452d49b8725c0cb3678646350946cd7910f350017edb091955d688f27186e3e4b71e3e371478beafe1249dff8e38b7e5906d3d972d92f662537a4f7cf043141f80f65295124719e2518c983c6d0758ad98b06bcbf84fac544f90fdbdc146174ea4d6f9e6717035252dacdcdb9f3de25b5b06105365d6d8c5ca58e36ef1762f60e7ed4050777e3ead17b6a0f6361ea0a6b8dcef75c2cdc54368844da8980fcb7caa503f65ff5469318bdc5386ad843efa61ed6a8a8b5f83afe115dc12ebb4872b82e4a7d4b28f881d0f5b9b9225a7f4fbbd9f24c4c6ef9e14a235dbf7ed34589019bd284e712ca99b30aeb0db693d951fe6c8dbe119a11b4c4a5bcce6b05b1595f07f7afcb98016543ca2cbd90d9fa47e684b351f003361b0af9235529b30ca3588c5cf90b797df48d39250d209b0fcf4fa818f3dc6d479d038dbef06fd4287c39a8c4c850cdc188099087c154f206b2093ef6fa3d8d624c6cff5ec363be30d4b35beba50c81beacdf9c23e6538ea0a5ffa78aba685794b55396b4f6bb04194169f5841b7482fb03ca1c3bf312f7facbada77f5e88d694aaa3bb2d12ff88ddaefece3590c7215d90c6ff9df7d359a256f830de422320d642f301ac64bb05892ce089c93e3fea6c9338bdc3443d829c2c83e3bbe0446465003fbab054d69d76e49d0e85618f9c1df0cb3a0b8e6d7f5314e51752c51f328a4d387fb9b30c566e1d13665534d1269ec1b6981d0aee8ae8a9030d5ba339f4295d08959a3ce087babca2fd820571232cf7f613435537721c88470090124d6d23ac6b9105468d887a257f13f31592a6e6380f32bc033d6b63c128707decc22a08ebba4add6ec1c1dd2b14ddca7e100e5898b4c162af57c095c1e3e85bf382cd2353fa381b4b0eb1ccfc17d39afc0", 0xbfa, 0x7}]) 20:22:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='ip_vti0\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x44}}, 0x10) 20:22:41 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:41 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x51000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='ip_vti0\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x44}}, 0x10) 20:22:41 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/user\x00') ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 20:22:41 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) [ 526.142115] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 526.169042] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:41 executing program 3: io_setup(0x800, &(0x7f0000000140)=0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f00000001c0), 0x10) io_submit(r0, 0x1, &(0x7f0000000240)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) 20:22:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54020000005d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000000140)=""/152, 0x98, 0x0, 0x0, 0x0) sendmsg$TCPDIAG_GETSOCK(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)={0x4c}, 0x4c}}, 0x24089001) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[], 0x12}}, 0x0) 20:22:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='ip_vti0\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x44}}, 0x10) [ 526.220873] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:42 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xe84f}, 0x700) 20:22:42 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:42 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x51010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='ip_vti0\x00', 0x10) connect$inet(r0, 0x0, 0x0) 20:22:42 executing program 4: syz_emit_ethernet(0x7e, &(0x7f0000000100)={@broadcast, @random="e0d35b1004bb", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x0, 0x0, 0x3, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, @local, @loopback, {[@timestamp={0x44, 0x34, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @rr={0x7, 0xb, 0x0, [@multicast2, @empty]}]}}}}}}}, 0x0) 20:22:42 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0xe, 0x0, &(0x7f00000000c0)=0x300) [ 526.971406] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:22:42 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000180)={@multicast, @broadcast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @dev, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 20:22:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='ip_vti0\x00', 0x10) connect$inet(r0, 0x0, 0x0) 20:22:42 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000400)={0xffffffffffffffff}, 0x2}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f00000004c0)={0x12, 0x10, 0xfa00, {0x0, r1, r0}}, 0x18) 20:22:42 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) [ 527.025649] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='ip_vti0\x00', 0x10) connect$inet(r0, 0x0, 0x0) [ 527.078417] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:42 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) read$sequencer(r0, &(0x7f0000000100)=""/43, 0x2b) 20:22:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xec18}, 0x700) 20:22:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x51020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:43 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) inotify_init() inotify_rm_watch(r0, 0x0) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@enum, @volatile={0x0, 0x0, 0x0, 0x5}, @struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000040)=""/219, 0x4a, 0xdb, 0x8}, 0x20) 20:22:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) connect$unix(r0, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000140)="1102962a3b814a508870092479bd5f", 0x1, 0x8000, 0x0, 0x59) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000001200), 0x14) recvfrom$inet(r0, &(0x7f0000000200)=""/4084, 0xff4, 0x62, 0x0, 0x0) 20:22:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x10) 20:22:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x10) 20:22:43 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) io_setup(0x51, &(0x7f00000004c0)=0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) io_submit(r1, 0x2, &(0x7f0000000340)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 527.907644] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:22:43 executing program 3: r0 = timerfd_create(0x7, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) timerfd_settime(r0, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x3938700}}, 0xffffffffffffffff) 20:22:43 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) inotify_init() inotify_rm_watch(r0, 0x0) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev}, 0x10) [ 527.980093] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 528.012147] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x51030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 528.163254] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 528.183474] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 528.194712] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xed01}, 0x700) 20:22:43 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) inotify_init() inotify_rm_watch(r0, 0x0) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000016c0)=@newtaction={0x494, 0x30, 0x1, 0x0, 0x0, {}, [{0x480, 0x1, [@m_police={0x47c, 0x1, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0x450, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404}], [@TCA_POLICE_RATE64={0xc, 0x8, 0xfffffffeffffffff}], [@TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, {0x9, 0x0, 0x0, 0x0, 0x0, 0x3}}}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x494}}, 0x0) 20:22:43 executing program 5: timer_create(0x2, 0x0, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x77359400}}, 0x0) timer_gettime(0x0, &(0x7f0000000040)) 20:22:43 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local}, 0x39) 20:22:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x52000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:44 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0xffffffd4, 0x0, 0x0, 0x20}}, &(0x7f0000000240)='GPL\x00', 0x1, 0x473, &(0x7f0000000280)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff60}, 0x48) 20:22:44 executing program 5: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000002000000002000000020000000100000018000000000200000002000000060000000a0000000e000000100000030000000100000002", 0x69, 0x400}, {0x0, 0x0, 0x860}], 0x0, &(0x7f0000012400)) 20:22:44 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r1) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:44 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xf000}, 0x700) [ 528.818363] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 528.847164] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:44 executing program 4: set_mempolicy(0xe003, 0x0, 0x0) [ 528.918824] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 528.953141] F2FS-fs (loop5): Wrong CP boundary, start(512) end(1536) blocks(16384) 20:22:44 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xc, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x22, 0xffffffd4, 0x0, 0x0, 0x20}}, &(0x7f0000000240)='GPL\x00', 0x1, 0x473, &(0x7f0000000280)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff60}, 0x48) 20:22:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x52010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 528.994123] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock 20:22:44 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETVESABLANK(r0, 0x4b41, &(0x7f00000000c0)) 20:22:44 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r1) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) [ 529.042754] F2FS-fs (loop5): Unable to read 2th superblock [ 529.061911] F2FS-fs (loop5): Wrong CP boundary, start(512) end(1536) blocks(16384) [ 529.082266] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock 20:22:44 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r0, &(0x7f0000000040), 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 529.110842] F2FS-fs (loop5): Unable to read 2th superblock 20:22:44 executing program 4: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x12081ff) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x149042, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x24003fe) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000180)={0x0, r0, 0x0, 0x0, 0x2}) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) 20:22:44 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r1) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:44 executing program 3: r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='Z', 0x1, 0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000600)='user\x00', &(0x7f0000000640)={'syz', 0x1}, &(0x7f0000000680)="263bee079ec8a15428369e31cb39c22630e93a079cca5de0fce3406387f2614657dfe6896cbc735ed157d60d07957eb9898120ce1a20c9fc544965e890381339f52c9e03a1d9e241d43b34df125e230bb0525906568cc51c4390386fce81e59e375e015af68efb81a029290b74f2306b2eaf374e8850e47a104889be709df36c47cf9d3b5aa3642b2a344518dffa05a97ea0a8aeec49b4fe552c88087d97ad1d7a8a10e40dba61463598ca9cdd0e5be52d32616382162500304c5810f483e44c", 0xc0, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='Z', 0x1, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000540)={r0, r1, r2}, &(0x7f00000008c0)=""/169, 0xa9, &(0x7f0000001580)={&(0x7f0000000040)={'crc32c-intel\x00'}}) [ 529.198488] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 529.215979] F2FS-fs (loop5): Wrong CP boundary, start(512) end(1536) blocks(16384) [ 529.236239] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 529.245925] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 529.269632] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 529.292363] F2FS-fs (loop5): Unable to read 2th superblock [ 529.345915] F2FS-fs (loop5): Wrong CP boundary, start(512) end(1536) blocks(16384) [ 529.396209] audit: type=1804 audit(1603311764.629:41): pid=2312 uid=0 auid=0 ses=4 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir841165903/syzkaller.Mnbeur/1164/bus" dev="sda1" ino=16627 res=1 20:22:44 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0205647, &(0x7f0000000080)={0x0, 0x500, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "96822e2c"}, 0x0, 0x0, @userptr}) 20:22:44 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:45 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xf016}, 0x700) 20:22:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x52020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:45 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev, 0x9}, r1}}, 0x30) 20:22:45 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x13c, 0x10, 0x713, 0x0, 0x0, {{@in=@local, @in6=@mcast2}, {@in6=@empty, 0x0, 0x32}, @in6=@empty, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x49, 0x2, {{'ecb(cipher_null)\x00'}, 0x8, "a2"}}]}, 0x13c}}, 0x0) 20:22:45 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000052c0)={0x64, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @empty}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x64}, 0x8}, 0x0) 20:22:45 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x5411, &(0x7f0000000080)={'team0\x00'}) [ 529.879942] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 529.910010] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 529.953445] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:45 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000080), &(0x7f0000000100)=0xc) 20:22:45 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000000)=0x9c) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000340)={r2, @in={{0x2, 0x0, @empty}}}, 0x9c) 20:22:45 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x2062b041}}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 20:22:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x52030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 530.178076] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 530.202111] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 530.234121] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xf100}, 0x700) 20:22:46 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000280)='.\x00', 0x2a4) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(0xffffffffffffffff, r1) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_int(r0, 0x1, 0x2c, 0x0, &(0x7f0000000040)) 20:22:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000780)={0x0, {{0x2, 0x0, @multicast2}}, 0x0, 0x1, [{{0x2, 0x0, @multicast1}}]}, 0x10c) 20:22:46 executing program 4: r0 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000340)='X', 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x11, r2, r0, r1, 0x0) 20:22:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x53000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:46 executing program 5: r0 = eventfd2(0x0, 0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000d4a000)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000fe0ff4)) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000040)) 20:22:46 executing program 4: r0 = syz_open_dev$binderN(&(0x7f0000000280)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000380)={0xc, 0x0, &(0x7f00000002c0)=[@dead_binder_done={0x4008630a}], 0x0, 0x0, 0x0}) 20:22:46 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000280)='.\x00', 0x2a4) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(0xffffffffffffffff, r1) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) [ 530.848635] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:22:46 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000d40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) [ 530.914446] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 530.938894] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 530.970247] binder: BC_ATTEMPT_ACQUIRE not supported 20:22:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x53010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 530.993701] binder: 2397:2399 ioctl c0306201 20000380 returned -22 20:22:46 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000001280)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) dup2(r1, r0) [ 531.153225] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 531.189173] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 531.200596] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xf400}, 0x700) 20:22:46 executing program 4: move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0xc0da6a4d885f9fb) 20:22:46 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000280)='.\x00', 0x2a4) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(0xffffffffffffffff, r1) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x53020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:46 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000080)={0x40, 0x0, 0x0, 0x3}, 0x10) connect$tipc(r0, &(0x7f0000000000)=@name, 0x10) 20:22:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mreq(r0, 0x6, 0x22, 0x0, &(0x7f0000000140)) 20:22:46 executing program 4: syz_emit_ethernet(0x86, &(0x7f0000000000)={@multicast, @empty=[0x2], @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x1b59, 0x64, 0x0, @wg=@response={0x2, 0x0, 0xffffffff, "000000010865390103000003000000016a3000", "9384bbeb3018ad591b661fe808b21b77", {"694c875dfb1be5d2a0057a62022a1564", "a329d3a13bd5b6cc6a9471314a1d8c69"}}}}}}}, 0x0) 20:22:47 executing program 3: inotify_init1(0x400) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="a8842a5edd212d0fb65f145661e815bb1e11bbdfa7ab757b5e940b3129b4175b730405923a55ee51", @ANYRES16=0x0, @ANYBLOB="00000000000000000070636900fca963f06d31302e30000000000800140bfc0000000000afbf030aef24520ca5c64600000000000000d0e2b814f54bdd52da31553b6b3561713e94f964d1ec1e924a73160fed3b540200007002de009d564bd37a8938594c3d24394efd22065c81740a3b7ba37f3203390000000000701097147506a285ae028e973d017ee16a17660a235c20fb4481ad5f3cd0bfa98cd1abe2ae38e1f94da2da8ac45ab035338f650023bf5b60718c08"], 0x38}}, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) r1 = dup(0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MPATH(r1, 0x0, 0x4001) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x6, 0x19, 0x0, "00000000000000000000000000000000000005000000000000008000000000000000000000000000439a00000000000000000000000000000000000000000000000000006926ed0c00"}, 0xd8) bind$inet(r0, &(0x7f0000000500)={0x2, 0x4e21, @multicast1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @empty}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000340)=[@timestamp, @sack_perm, @window={0x3, 0x0, 0xf000}, @window={0x3, 0x4, 0x7fff}, @sack_perm, @timestamp, @timestamp, @sack_perm], 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x0, 0x40000007ffe, 0x7fffffdf}, 0x14) shutdown(r0, 0x1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000500)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @empty}, 0x10) 20:22:47 executing program 5: socketpair(0x23, 0x5, 0x0, &(0x7f0000000180)) 20:22:47 executing program 1: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f00000000000000020000000200000000800000008000002000000028c4645f28c4645f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000180)="0000000030080000060000334bb26c9bd447c101000000cb00646cce14cb1e9f5b", 0x21, 0x4e0}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012500)="ed4100000010000027c4645f28c4645f28c4645f000000000000040008", 0x1d, 0x4080}, {0x0, 0x0, 0x52000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 531.767945] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 531.803115] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 531.846746] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:47 executing program 1: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) [ 531.961021] EXT4-fs (loop4): warning: mounting unchecked fs, running e2fsck is recommended [ 531.975853] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=a802e01c, mo2=0002] [ 531.994136] System zones: 0-4 [ 532.008297] EXT4-fs error (device loop4): ext4_orphan_get:1257: comm syz-executor.4: bad orphan inode 855638022 [ 532.019824] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 20:22:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xf401}, 0x700) 20:22:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x31, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) connect$inet(r0, &(0x7f0000000500)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 20:22:47 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x53030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:47 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000380)={@local, @remote, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x21, 0x0, @dev, @private}, {0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 20:22:47 executing program 1: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:47 executing program 4: syz_emit_ethernet(0x76, &(0x7f00000003c0)={@broadcast, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @redirect={0x5, 0x0, 0x0, @broadcast, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, @private, @rand_addr, {[@generic={0x0, 0x5, 'j!K'}, @timestamp_addr={0x44, 0x1c, 0x0, 0x1, 0x0, [{@local}, {@remote}, {@local}]}, @timestamp_addr={0x44, 0x14, 0x0, 0x1, 0x0, [{@remote}, {@loopback}]}]}}}}}}}, 0x0) 20:22:47 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) connect$llc(r0, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x10) [ 532.629752] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:22:47 executing program 1: creat(0x0, 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:47 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0xffffffffa0018000, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x2, 0x4, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @dev}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 532.689550] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:48 executing program 3: openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x8}, 0x0, 0x0) [ 532.754007] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x54000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:48 executing program 4: io_setup(0xfff, &(0x7f0000000300)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={[0x1]}, 0x8}) [ 532.913682] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 532.924104] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 532.939320] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xf427}, 0x700) 20:22:48 executing program 1: creat(0x0, 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:48 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, 0x0, 0x0) 20:22:48 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x4, 0x2, 0x4}, 0x40) 20:22:48 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x54010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x4001, 0x3, 0x298, 0x0, 0x0, 0x148, 0x0, 0x148, 0x200, 0x240, 0x240, 0x200, 0x240, 0x3, 0x0, {[{{@ip={@local, @local, 0x0, 0x0, 'bridge_slave_1\x00', 'bond_slave_1\x00'}, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'macvtap0\x00', {0x0, 0x0, 0x1ff, 0x0, 0x0, 0x6, 0x7}}}, @common=@inet=@dscp={{0x28, 'dscp\x00'}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "2f81029e8c0e75b1b631bc33b7f79ad36770f8464e8da84f409e2c0922a2"}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f8) 20:22:48 executing program 1: creat(0x0, 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) [ 533.545423] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:22:48 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002140)='/proc/keys\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) 20:22:48 executing program 5: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_TIOCINQ(r0, 0x8955, &(0x7f0000000040)) 20:22:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@struct={0x0, 0x0, 0x0, 0xa, 0x0, 0x2}, @typedef={0x2, 0x0, 0x0, 0xc}]}, {0x0, [0x0, 0x5f]}}, &(0x7f00000003c0)=""/236, 0x34, 0xec, 0x8}, 0x20) [ 533.591816] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:48 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x22441, 0x0) fcntl$getown(r0, 0x409) 20:22:48 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) [ 533.655491] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xf600}, 0x700) 20:22:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x3}}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x15}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2}}]}}, &(0x7f0000000100)=""/140, 0x5a, 0x8c, 0x8}, 0x20) 20:22:49 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x17, r0) 20:22:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x54020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:49 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:49 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45528d", 0xa, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 20:22:49 executing program 4: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 20:22:49 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9, 0x1, 'cake\x00'}, {0xc, 0x2, [@TCA_CAKE_OVERHEAD={0x8}]}}]}, 0x3c}}, 0x0) [ 534.408378] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:22:49 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) [ 534.462117] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:49 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45528d", 0xa, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 534.513583] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:49 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x0, 0x0) mmap$dsp(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x12, r0, 0x0) 20:22:49 executing program 3: r0 = memfd_create(&(0x7f0000000340)='\x00\x00\x00\x00\x00\x00z\x9b\xbe\xe8t%\xfc\x96L\x82\xdb', 0x0) preadv2(r0, &(0x7f0000002500)=[{&(0x7f0000002340)=""/117, 0x75}], 0x1, 0x0, 0x0, 0x8) 20:22:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xfe00}, 0x700) 20:22:50 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, 0x0, 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x54030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xffffff61}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="00f0000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800"/20, @ANYRES32=r3, @ANYBLOB="000000000000000008000a0010"], 0x28}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x5c, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r5, 0x2}}, 0x20}}, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000005c0)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x6c, 0x0, 0x0, r7}}, 0x20}, 0x1, 0x600000000000000}, 0x0) 20:22:50 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x3c1, 0x3, 0x378, 0x1d0, 0xc8, 0x0, 0x1d0, 0x5803, 0x2a8, 0x2e8, 0x2e8, 0x2a8, 0x2e8, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'bridge0\x00', 'geneve1\x00'}, 0x0, 0x190, 0x1d0, 0x0, {0x0, 0x2000000000000}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "cfcaf80c672f61cd17ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e67262c1fe4b124e0f7323a587d2a1fcfe36bbf12eca0a7b66c60c527bac2b5"}}, @common=@inet=@socket1={{0x28, 'socket\x00'}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}, {{@ipv6={@ipv4={[], [], @remote}, @loopback, [], [], 'veth0_to_team\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0xd8}, @common=@inet=@SET2={0x30, 'SET\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d8) 20:22:50 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45528d", 0xa, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 535.303280] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 535.322655] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:22:50 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, 0x0, 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:50 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) [ 535.379801] IPv6: ADDRCONF(NETDEV_UP): veth3: link is not ready [ 535.393622] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:50 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45528d", 0xa, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 535.430816] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 535.442506] team0: Port device veth3 added 20:22:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x55000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:50 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, 0x0, 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:50 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) [ 535.674983] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 535.708047] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 535.741745] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue [ 535.841398] team0: Port device veth3 removed [ 535.901958] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 535.918325] IPv6: ADDRCONF(NETDEV_UP): veth3: link is not ready [ 535.929813] team0: Port device veth3 added [ 536.034737] team0: Port device veth3 removed 20:22:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x1b6d8}, 0x700) 20:22:51 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x0) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:51 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) 20:22:51 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) 20:22:51 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x55010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:51 executing program 4: r0 = socket(0x10, 0x80002, 0xc) fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x0) 20:22:51 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) 20:22:51 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) [ 536.252191] SELinux: Context system_u:object_r:iptables_unit_file_t:s0 is not valid (left unmapped). 20:22:51 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x0) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:51 executing program 5: mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x0) [ 536.317729] audit: type=1400 audit(1603311771.550:42): avc: denied { relabelto } for pid=2686 comm="syz-executor.4" name="NETLINK" dev="sockfs" ino=124864 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=netlink_netfilter_socket permissive=1 [ 536.335273] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:22:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, r1, 0x1, 0x0, 0x0, {0x8}}, 0x14}}, 0x0) 20:22:51 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) [ 536.426294] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 536.491958] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:52 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x20000}, 0x700) 20:22:52 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x0) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:52 executing program 5: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45528d", 0xa, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 20:22:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x0) 20:22:52 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) 20:22:52 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x55020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:52 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) 20:22:52 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) inotify_init() r1 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r1) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='mountstats\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r4, 0x8982, &(0x7f0000000000)={0x0, 'syzkaller1\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x2, 0x0, @dev}}) [ 537.213537] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:22:52 executing program 5: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45528d", 0xa, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 20:22:52 executing program 3: socket$inet(0x2, 0x840000000003, 0x2) r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) [ 537.266609] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:52 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) inotify_init() r1 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r1) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) [ 537.323422] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x910d0}, 0x700) 20:22:53 executing program 3: socket$inet(0x2, 0x840000000003, 0x2) r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) 20:22:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000080)="390000001300054700bb65e1c3e4ffff06655800010000005600000025000000190004000400000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) 20:22:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x55030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:53 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) inotify_init() r1 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r1) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:53 executing program 5: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45528d", 0xa, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 20:22:53 executing program 3: socket$inet(0x2, 0x840000000003, 0x2) r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) [ 538.072190] netlink: 'syz-executor.4': attribute type 4 has an invalid length. [ 538.091584] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 538.114400] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 20:22:53 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, 0x0, 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) [ 538.146166] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:53 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', 0x0, 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45528d", 0xa, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 20:22:53 executing program 3: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) 20:22:53 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, 0x0, 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) [ 538.211941] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:53 executing program 3: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) [ 538.672056] netlink: 'syz-executor.4': attribute type 4 has an invalid length. 20:22:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xefdc0}, 0x700) 20:22:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x56000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:54 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', 0x0, 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45528d", 0xa, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 20:22:54 executing program 3: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) 20:22:54 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, 0x0, 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:54 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000dc0)={0x1, 0x0, [{0x5000, 0x0, 0x0}]}) [ 539.037373] ================================================================================ [ 539.046256] UBSAN: Undefined behaviour in drivers/vhost/vhost.c:116:62 [ 539.052937] load of value 8 is not a valid value for type '_Bool' [ 539.059183] CPU: 1 PID: 2836 Comm: syz-executor.4 Not tainted 4.19.152-syzkaller #0 [ 539.066976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 539.076329] Call Trace: [ 539.079008] dump_stack+0x22c/0x33e [ 539.082703] ubsan_epilogue+0xe/0x3a [ 539.086409] __ubsan_handle_load_invalid_value.cold+0x63/0x6f [ 539.092331] ? __lockdep_init_map+0x100/0x5c0 [ 539.096857] vhost_vq_reset.constprop.0.cold+0x15/0x1a [ 539.102146] vhost_dev_init+0x442/0x780 [ 539.106133] vhost_net_open+0x54c/0x730 [ 539.110099] ? vhost_zerocopy_signal_used+0x3d0/0x3d0 [ 539.115322] misc_open+0x372/0x4a0 [ 539.118851] ? misc_devnode+0x120/0x120 [ 539.122839] chrdev_open+0x266/0x770 [ 539.126581] ? lockref_get+0x11/0x50 [ 539.130297] ? __register_chrdev+0x400/0x400 [ 539.134722] do_dentry_open+0x4aa/0x1160 [ 539.138770] ? __register_chrdev+0x400/0x400 [ 539.143218] ? security_inode_permission+0xc5/0xf0 [ 539.148134] ? chmod_common+0x3f0/0x3f0 [ 539.152156] ? inode_permission+0x10c/0x540 [ 539.156584] ? unlazy_walk+0x1f6/0x520 [ 539.160466] path_openat+0x7d5/0x2e90 [ 539.164264] ? path_lookupat+0x8d0/0x8d0 [ 539.168329] ? mark_held_locks+0xf0/0xf0 [ 539.172380] ? mark_held_locks+0xf0/0xf0 [ 539.176444] do_filp_open+0x18c/0x3f0 [ 539.180231] ? may_open_dev+0xf0/0xf0 [ 539.184024] ? lock_downgrade+0x750/0x750 [ 539.188160] ? lock_acquire+0x170/0x3f0 [ 539.192289] ? do_raw_spin_unlock+0x171/0x240 [ 539.196777] ? _raw_spin_unlock+0x29/0x40 [ 539.200961] ? __alloc_fd+0x2ab/0x590 [ 539.204754] do_sys_open+0x3b3/0x520 [ 539.208456] ? filp_open+0x70/0x70 [ 539.211983] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 539.217394] ? trace_hardirqs_off_caller+0x6e/0x210 [ 539.222398] ? do_syscall_64+0x21/0x670 [ 539.226361] do_syscall_64+0xf9/0x670 [ 539.230148] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 539.235319] RIP: 0033:0x45de59 [ 539.238498] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 539.257382] RSP: 002b:00007fd246acdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 539.265080] RAX: ffffffffffffffda RBX: 0000000000024a80 RCX: 000000000045de59 [ 539.272350] RDX: 0000000000000002 RSI: 00000000200005c0 RDI: ffffffffffffff9c [ 539.279605] RBP: 000000000118bf68 R08: 0000000000000000 R09: 0000000000000000 [ 539.286858] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000118bf2c [ 539.294112] R13: 00007fff11da3e5f R14: 00007fd246ace9c0 R15: 000000000118bf2c [ 539.301378] ================================================================================ 20:22:54 executing program 3: r0 = socket$inet(0x2, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) 20:22:54 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x0) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:54 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', 0x0, 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45528d", 0xa, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 539.400149] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 539.440963] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:54 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000440)=ANY=[], 0x20) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, 0x0) [ 539.497708] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:54 executing program 3: r0 = socket$inet(0x2, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) 20:22:54 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 20:22:55 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x1000000}, 0x700) 20:22:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x56010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:55 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x0) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:55 executing program 3: r0 = socket$inet(0x2, 0x0, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) 20:22:55 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 20:22:55 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000fe6000)={0x3, 0x4, 0x4, 0x100000009, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40) 20:22:55 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x0) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:55 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 540.056479] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:22:55 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) [ 540.105666] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 540.139290] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:55 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x0) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) 20:22:55 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45528d", 0xa, 0x600}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 20:22:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x56020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 540.354262] FAT-fs (loop5): Directory bread(block 6) failed [ 540.384137] FAT-fs (loop5): Directory bread(block 6) failed [ 540.471154] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 540.482204] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 540.495781] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x2000000}, 0x700) 20:22:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='nv\x00', 0x3) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, [], 0x1c}, 0xd}, 0x1c) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) sendto$inet6(r0, &(0x7f0000000200)='\n', 0x1, 0x0, 0x0, 0x0) 20:22:56 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(0xffffffffffffffff, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:56 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x0) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) 20:22:56 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45528d", 0xa, 0x600}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 20:22:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x56030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:56 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45528d", 0xa, 0x600}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) [ 540.894864] FAT-fs (loop5): Directory bread(block 6) failed [ 540.903332] FAT-fs (loop5): Directory bread(block 6) failed 20:22:56 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x0) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) 20:22:56 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x5, 0x2}, 0x10}}, 0x0) [ 540.950994] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 540.965756] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:56 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(0xffffffffffffffff, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) [ 540.992790] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x57000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:56 executing program 3: socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) [ 541.062235] FAT-fs (loop5): Directory bread(block 6) failed [ 541.075284] FAT-fs (loop5): Directory bread(block 6) failed [ 541.186145] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 541.204975] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 541.230153] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x3000000}, 0x700) 20:22:57 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45528d", 0xa, 0x600}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 20:22:57 executing program 3: socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) 20:22:57 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(0xffffffffffffffff, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:57 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000540)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x24) connect$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) 20:22:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x57010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:57 executing program 3: socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) [ 541.872227] FAT-fs (loop5): Directory bread(block 6) failed [ 541.880770] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:22:57 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r2, &(0x7f0000001ff0)={0x1d, r3}, 0x10) r4 = dup3(r2, r1, 0x0) r5 = dup3(r4, r0, 0x0) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f000000a000)=@canfd={{0x1}, 0x2, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) [ 541.918819] FAT-fs (loop5): Directory bread(block 6) failed [ 541.949881] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:57 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45528d", 0xa, 0x600}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 20:22:57 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, 0x0) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:57 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000080)=0x7, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) [ 541.983323] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x57020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 542.102939] FAT-fs (loop5): Directory bread(block 6) failed [ 542.113157] FAT-fs (loop5): Directory bread(block 6) failed [ 542.152987] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 542.184137] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 542.193996] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:57 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x4000000}, 0x700) 20:22:57 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, 0x0) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:57 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r2, &(0x7f0000001ff0)={0x1d, r3}, 0x10) r4 = dup3(r2, r1, 0x0) r5 = dup3(r4, r0, 0x0) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f000000a000)=@canfd={{0x1}, 0x2, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 20:22:57 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000080)=0x7, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) 20:22:57 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000140)="53595a4b414c4c45528d", 0xa, 0x600}, {0x0}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 20:22:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x57030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:58 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, 0x0) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) [ 542.797436] FAT-fs (loop5): Directory bread(block 6) failed [ 542.820468] FAT-fs (loop5): Directory bread(block 6) failed 20:22:58 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 20:22:58 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000000080)=0x7, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) 20:22:58 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r2, &(0x7f0000001ff0)={0x1d, r3}, 0x10) r4 = dup3(r2, r1, 0x0) r5 = dup3(r4, r0, 0x0) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f000000a000)=@canfd={{0x1}, 0x2, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) [ 542.865929] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 542.903735] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:58 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(0x0, &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:58 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, 0x0, 0x0) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) [ 542.971809] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x45e0000}, 0x700) 20:22:58 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(0x0, &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:58 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 20:22:58 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, 0x0, 0x0) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) 20:22:58 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x58000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:58 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r2, &(0x7f0000001ff0)={0x1d, r3}, 0x10) r4 = dup3(r2, r1, 0x0) r5 = dup3(r4, r0, 0x0) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f000000a000)=@canfd={{0x1}, 0x2, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 20:22:59 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, 0x0, 0x0) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) 20:22:59 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(0x0, &(0x7f00000000c0)='security.capability\x00', 0x0, 0x0, 0x0) 20:22:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x5000000}, 0x700) 20:22:59 executing program 4: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r1, &(0x7f0000001ff0)={0x1d, r2}, 0x10) dup3(r1, r0, 0x0) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f000000a000)=@canfd={{0x1}, 0x2, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) [ 543.810092] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:22:59 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 20:22:59 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080), 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) [ 543.867946] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:22:59 executing program 4: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r1, &(0x7f0000001ff0)={0x1d, r2}, 0x10) dup3(r1, r0, 0x0) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f000000a000)=@canfd={{0x1}, 0x2, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 20:22:59 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', 0x0, 0x0, 0x0, 0x0) [ 543.941528] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x58010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:22:59 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080), 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) 20:22:59 executing program 4: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r1, &(0x7f0000001ff0)={0x1d, r2}, 0x10) dup3(r1, r0, 0x0) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f000000a000)=@canfd={{0x1}, 0x2, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 20:22:59 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', 0x0, 0x0, 0x0, 0x0) 20:22:59 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080), 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) 20:22:59 executing program 1: creat(&(0x7f00000002c0)='./bus\x00', 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000280)='.\x00', 0x2a4) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r0, r2) setxattr$security_capability(&(0x7f0000000180)='./bus\x00', 0x0, 0x0, 0x0, 0x0) [ 544.246982] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 544.257222] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 544.275179] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:22:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x6010000}, 0x700) 20:22:59 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 20:22:59 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r1 = socket$inet(0x2, 0x0, 0x2) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) 20:22:59 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r1, &(0x7f0000001ff0)={0x1d, r2}, 0x10) r3 = dup3(0xffffffffffffffff, r0, 0x0) sendmsg$can_raw(r3, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f000000a000)=@canfd={{0x1}, 0x2, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 20:22:59 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r2, &(0x7f0000001ff0)={0x1d, r3}, 0x10) r4 = dup3(r2, r1, 0x0) r5 = dup3(r4, r0, 0x0) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f000000a000)=@canfd={{0x1}, 0x2, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 20:22:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x58020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) [ 544.752111] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:23:00 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r2, &(0x7f0000001ff0)={0x1d, r3}, 0x10) r4 = dup3(r2, r1, 0x0) r5 = dup3(r4, r0, 0x0) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f000000a000)=@canfd={{0x1}, 0x2, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 20:23:00 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r1, &(0x7f0000001ff0)={0x1d, r2}, 0x10) r3 = dup3(0xffffffffffffffff, r0, 0x0) sendmsg$can_raw(r3, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f000000a000)=@canfd={{0x1}, 0x2, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) [ 544.795427] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:23:00 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 20:23:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x7000000}, 0x700) [ 544.847940] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:23:00 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r1 = socket$inet(0x2, 0x0, 0x2) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) 20:23:00 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r1, &(0x7f0000001ff0)={0x1d, r2}, 0x10) r3 = dup3(0xffffffffffffffff, r0, 0x0) sendmsg$can_raw(r3, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f000000a000)=@canfd={{0x1}, 0x2, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 20:23:00 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r2, &(0x7f0000001ff0)={0x1d, r3}, 0x10) r4 = dup3(r2, r1, 0x0) r5 = dup3(r4, r0, 0x0) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f000000a000)=@canfd={{0x1}, 0x2, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 20:23:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x58030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:23:00 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) r3 = dup3(r2, r1, 0x0) r4 = dup3(r3, r0, 0x0) sendmsg$can_raw(r4, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f000000a000)=@canfd={{0x1}, 0x2, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 20:23:00 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000002540)=@newqdisc={0x45c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8, 0x1, 'tbf\x00'}, {0x430, 0x2, [@TCA_TBF_RTAB={0x404, 0x2, [0xffffffff]}, @TCA_TBF_PARMS={0x28, 0x1, {{0x3, 0x0, 0x0, 0x0, 0x0, 0x1}}}]}}]}, 0x45c}}, 0x0) 20:23:00 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r1 = socket$inet(0x2, 0x0, 0x2) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) 20:23:00 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 20:23:00 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) r3 = dup3(r2, r1, 0x0) r4 = dup3(r3, r0, 0x0) sendmsg$can_raw(r4, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f000000a000)=@canfd={{0x1}, 0x2, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) [ 545.124014] sch_tbf: burst 0 is lower than device syz_tun mtu (1514) ! [ 545.150702] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:23:00 executing program 1: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000034000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) getsockopt$inet6_buf(r0, 0x29, 0x10000000000030, &(0x7f0000034000)=""/144, &(0x7f0000e5f000)=0x90) 20:23:00 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x0) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) [ 545.245463] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 545.268274] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:23:00 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0x8000000}, 0x700) 20:23:00 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) r3 = dup3(r2, r1, 0x0) r4 = dup3(r3, r0, 0x0) sendmsg$can_raw(r4, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f000000a000)=@canfd={{0x1}, 0x2, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 20:23:00 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000140), 0x0, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 20:23:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x59000000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:23:00 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000640)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x3f00, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x58, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x8, @TCA_SFB_PARMS={0x28}}}]}, 0x58}}, 0x0) 20:23:00 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x0) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) 20:23:01 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000001ff0), 0x10) r3 = dup3(r2, r1, 0x0) r4 = dup3(r3, r0, 0x0) sendmsg$can_raw(r4, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f000000a000)=@canfd={{0x1}, 0x2, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) [ 545.784579] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:23:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) dup2(r0, r1) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000080)=""/8, &(0x7f00000000c0)=0x8) 20:23:01 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000140), 0x0, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 20:23:01 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x0) setsockopt$inet_int(r1, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) 20:23:01 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000001ff0), 0x10) r3 = dup3(r2, r1, 0x0) r4 = dup3(r3, r0, 0x0) sendmsg$can_raw(r4, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f000000a000)=@canfd={{0x1}, 0x2, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) [ 545.841229] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 545.872964] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:23:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) dup2(r0, r1) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000080)=""/8, &(0x7f00000000c0)=0x8) 20:23:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xa000000}, 0x700) 20:23:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x59010000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:23:01 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000001ff0), 0x10) r3 = dup3(r2, r1, 0x0) r4 = dup3(r3, r0, 0x0) sendmsg$can_raw(r4, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f000000a000)=@canfd={{0x1}, 0x2, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 20:23:01 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) 20:23:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) dup2(r0, r1) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000080)=""/8, &(0x7f00000000c0)=0x8) 20:23:01 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000140), 0x0, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 20:23:01 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) r3 = dup3(0xffffffffffffffff, r1, 0x0) r4 = dup3(r3, r0, 0x0) sendmsg$can_raw(r4, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f000000a000)=@canfd={{0x1}, 0x2, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 20:23:01 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) 20:23:01 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000140)='SYZKA', 0x5, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 20:23:02 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) r3 = dup3(0xffffffffffffffff, r1, 0x0) r4 = dup3(r3, r0, 0x0) sendmsg$can_raw(r4, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f000000a000)=@canfd={{0x1}, 0x2, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) [ 546.718215] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 546.749782] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:23:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) dup2(r0, r1) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000080)=""/8, &(0x7f00000000c0)=0x8) 20:23:02 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) [ 546.774110] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:23:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xe000000}, 0x700) 20:23:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x59020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:23:02 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d, r2}, 0x10) r3 = dup3(0xffffffffffffffff, r1, 0x0) r4 = dup3(r3, r0, 0x0) sendmsg$can_raw(r4, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f000000a000)=@canfd={{0x1}, 0x2, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 20:23:02 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/8, &(0x7f00000000c0)=0x8) 20:23:02 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x0, &(0x7f0000000080)=0x7, 0x4) 20:23:02 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000140)='SYZKA', 0x5, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 20:23:02 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x0, &(0x7f0000000080)=0x7, 0x4) 20:23:02 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/8, &(0x7f00000000c0)=0x8) 20:23:02 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r1, &(0x7f0000001ff0)={0x1d, r2}, 0x10) r3 = dup3(r1, 0xffffffffffffffff, 0x0) r4 = dup3(r3, r0, 0x0) sendmsg$can_raw(r4, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f000000a000)=@canfd={{0x1}, 0x2, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) [ 547.562833] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 547.597979] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended 20:23:02 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000140)='SYZKA', 0x5, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 20:23:02 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/8, &(0x7f00000000c0)=0x8) [ 547.635023] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 20:23:02 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r1, &(0x7f0000001ff0)={0x1d, r2}, 0x10) r3 = dup3(r1, 0xffffffffffffffff, 0x0) r4 = dup3(r3, r0, 0x0) sendmsg$can_raw(r4, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f000000a000)=@canfd={{0x1}, 0x2, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 20:23:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x3654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='illinois\x00', 0x9) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000440)={0x20000, 0x4, 0x6, 0x5, 0x1}, 0x14) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000004c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2cbd2e000000", @ANYRES16=0x0, @ANYBLOB="000428bd7000fddbdf25050000000c000600729ecd963668a72a0c0008008b06000000000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000004) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000280)=@ccm_128={{0x303}, "c4e254e728a0bd19", "cd05d221e0ca4573cb324620ad2386c0", "106dae10", "3ff0eb41452f6c07"}, 0x28) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) sendmmsg$inet(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)={0x2, 0x4e23, @private=0xa010101}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000280)}, {&(0x7f0000000300)="5ac647153b4ba9bcef1f3e22e36d943a393f9dd14676c100ba244961ac593a6ad6cd8cf78215d1cf89c2976491596e48df6faee9f52e5b1191764aba70069d2a07ed043e11ec984d7445d8871f8cb1ddefad851a7d8dda0892e29e0956b92d88db3cb0542d7fac6d3a199a4a8aefd6524e4f4fc19a450e9a3252d3fe3d249c5e4220f3154b9176d1266f9ee37c973bf2aa16ab615d4486fef3175a2464180c3a2172476906d9de2f2205e92f5062f4106ef0c3f64e00a73d5e05947a6d78e79741602be5e6bca3624a597f3a18", 0xcd}], 0x2}}], 0x1, 0x0) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000580)={0x0, 0x2, &(0x7f0000000500)=[{&(0x7f0000000740)=""/4096, 0xa15b0}], 0x1, 0x0, 0xf000000}, 0x700) 20:23:03 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x0, &(0x7f0000000080)=0x7, 0x4) 20:23:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, 0xffffffffffffffff) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)=""/8, &(0x7f00000000c0)=0x8) 20:23:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x59030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000000800)="210000b2c35e209069df3e4b04330e9b690a0011", 0x14, 0x560}, {&(0x7f0000010400)="030000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000000040)) 20:23:03 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r1, &(0x7f0000001ff0)={0x1d, r2}, 0x10) r3 = dup3(r1, 0xffffffffffffffff, 0x0) r4 = dup3(r3, r0, 0x0) sendmsg$can_raw(r4, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f000000a000)=@canfd={{0x1}, 0x2, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 20:23:03 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000140)='SYZKALLE', 0x8, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 20:23:03 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r1, &(0x7f0000001ff0)={0x1d, r2}, 0x10) r3 = dup3(r1, r0, 0x0) r4 = dup3(r3, 0xffffffffffffffff, 0x0) sendmsg$can_raw(r4, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f000000a000)=@canfd={{0x1}, 0x2, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 20:23:03 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x5, 0x0, 0x0) 20:23:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, 0xffffffffffffffff) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)=""/8, &(0x7f00000000c0)=0x8) [ 548.433076] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem 20:23:03 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000140)='SYZKALLE', 0x8, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'koi8-ru'}}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 20:23:03 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r1, &(0x7f0000001ff0)={0x1d, r2}, 0x10) r3 = dup3(r1, r0, 0x0) r4 = dup3(r3, 0xffffffffffffffff, 0x0) sendmsg$can_raw(r4, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f000000a000)=@canfd={{0x1}, 0x2, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0x2000a048}}, 0x0) 20:23:03 executing program 3: r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x5, 0x0, 0x0) [ 548.492173] EXT4-fs (loop2): warning: mounting unchecked fs, running e2fsck is recommended [ 548.528421] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue