800a0002007b267b2e7d000000060015000400000008001000090000000800060004000000080010003a820106080019002da074c93a1c5de0534c67", @ANYRES32=r7, @ANYBLOB], 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x8000) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc04c560f, &(0x7f0000000140)={0x7, 0x7, 0x4, 0x10000, 0x3, {0x0, 0x2710}, {0x2, 0x0, 0xef, 0x2, 0x80, 0x9, "22fed490"}, 0x76b, 0x3, @planes=&(0x7f0000000240)={0xfffffff7, 0x1, @mem_offset=0x5, 0x3}, 0x0, 0x0, 0xffffffffffffffff}) preadv(r8, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/73, 0x49}, {&(0x7f0000000000)=""/4, 0x4}, {&(0x7f0000000240)}, {&(0x7f0000000280)=""/22, 0x16}], 0x4, 0x7, 0x6) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) [ 283.743144][ T9984] loop0: detected capacity change from 0 to 1024 [ 283.826874][ T9984] EXT4-fs (loop0): Test dummy encryption mode enabled [ 283.835780][ T9984] EXT4-fs (loop0): Test dummy encryption mode enabled [ 283.842948][ T9984] EXT4-fs (loop0): unsupported descriptor size 0 [ 284.139505][ T9993] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 13:25:47 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) dup3(r0, r1, 0x80000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r3, &(0x7f0000000180)='./file0\x00', 0x40003, 0x192) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4a24, 0x5, @remote, 0x102}, 0x1c) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$int_in(r4, 0x40000000af01, 0x0) ioctl$VHOST_NET_SET_BACKEND(r4, 0x4008af03, &(0x7f0000000000)) socketpair(0x29, 0xa, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r5, &(0x7f0000000340)="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", 0x131, 0x48000, &(0x7f0000000080)={0xa, 0x4e23, 0x8, @loopback, 0x7fffffff}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}, 0x0, 0x0, 0x300, 0x0, 0x54}, 0x9c) 13:25:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) [ 284.198300][ T9995] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 284.306276][ T9993] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 13:25:48 executing program 2: io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$dlm_control(0xffffff9c, &(0x7f0000000c40), 0x101580, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d40)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000cc0)=@RTM_GETNSID={0x24, 0x5a, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@NETNSA_FD={0x8}, @NETNSA_FD={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000010}, 0x4050) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000100001080048faf5ad0f659f78000000", @ANYRES32=0x0, @ANYBLOB="478800000000000008001b0000000000"], 0x28}}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000980)={@broadcast, @local, 0x0}, &(0x7f00000009c0)=0xc) r4 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r6 = openat$vcsu(0xffffff9c, &(0x7f0000000440), 0x2000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000b00)=0xe4) sendmsg$nl_route(r1, &(0x7f0000000c00)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000480)=ANY=[@ANYBLOB="600000001800000425bd7000ffdbdf2502208002ff0400070020000008000300", @ANYRES32=r3, @ANYBLOB="14001680100003800a0002007b267b2e7d000000060015000400000008001000090000000800060004000000080010003a820106080019002da074c93a1c5de0534c67", @ANYRES32=r7, @ANYBLOB], 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x8000) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc04c560f, &(0x7f0000000140)={0x7, 0x7, 0x4, 0x10000, 0x3, {0x0, 0x2710}, {0x2, 0x0, 0xef, 0x2, 0x80, 0x9, "22fed490"}, 0x76b, 0x3, @planes=&(0x7f0000000240)={0xfffffff7, 0x1, @mem_offset=0x5, 0x3}}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) [ 284.626087][ T9999] loop0: detected capacity change from 0 to 1024 [ 284.698360][ T9999] EXT4-fs (loop0): Test dummy encryption mode enabled [ 284.707676][ T9999] EXT4-fs (loop0): Test dummy encryption mode enabled [ 284.714897][ T9999] EXT4-fs (loop0): unsupported descriptor size 0 [ 284.741335][T10004] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 284.773906][T10004] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 13:25:48 executing program 3: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r0, 0x202, 0x70bd2b, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'netpci0\x00'}]}, 0x28}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xd0, r2, 0x2, 0x70bd2d, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_SECCTX={0x2e, 0x7, 'system_u:object_r:netlabel_mgmt_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast1}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'wg0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x28, 0x7, 'system_u:object_r:clock_device_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}]}, 0xd0}, 0x1, 0x0, 0x0, 0x40000}, 0x64004010) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x48, 0x0, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private0}, @NLBL_UNLABEL_A_SECCTX={0x1f, 0x7, 'system_u:object_r:lib_t:s0\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x20044080}, 0x4040) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x34, r0, 0x10, 0x70bd2c, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast2}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @private=0xa010101}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @loopback}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000004}, 0x8850) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000580), r3) syz_genetlink_get_family_id$nl802154(&(0x7f00000005c0), r1) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r4, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x30, r0, 0x2, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) sendmsg$NBD_CMD_STATUS(r3, &(0x7f00000007c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x38, 0x0, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x126}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xfffffffffffffffb}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x4000004) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000800), r4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SET_MACPARAMS(r6, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x7e14905b1571ca3f}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x2c, r5, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@IEEE802154_ATTR_TXPOWER={0x5, 0x21, 0x8}, @IEEE802154_ATTR_TXPOWER={0x5, 0x21, 0x9}, @IEEE802154_ATTR_CSMA_RETRIES={0x5, 0x25, 0x8}]}, 0x2c}}, 0x1) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r7, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x4c, r2, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @local}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000000b80)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000b40)={&(0x7f0000000ac0)={0x58, r2, 0x2, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_SECCTX={0x28, 0x7, 'system_u:object_r:crash_device_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'team_slave_1\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) [ 284.802572][T10006] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 13:25:48 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) dup3(r0, r1, 0x80000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r3, &(0x7f0000000180)='./file0\x00', 0x40003, 0x192) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4a24, 0x5, @remote, 0x102}, 0x1c) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$int_in(r4, 0x40000000af01, 0x0) ioctl$VHOST_NET_SET_BACKEND(r4, 0x4008af03, &(0x7f0000000000)) socketpair(0x29, 0xa, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$inet6(r5, &(0x7f0000000340)="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", 0x131, 0x48000, &(0x7f0000000080)={0xa, 0x4e23, 0x8, @loopback, 0x7fffffff}, 0x1c) 13:25:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:25:48 executing program 2: io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$dlm_control(0xffffff9c, &(0x7f0000000c40), 0x101580, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d40)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000cc0)=@RTM_GETNSID={0x24, 0x5a, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@NETNSA_FD={0x8}, @NETNSA_FD={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000010}, 0x4050) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000100001080048faf5ad0f659f78000000", @ANYRES32=0x0, @ANYBLOB="478800000000000008001b0000000000"], 0x28}}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000980)={@broadcast, @local, 0x0}, &(0x7f00000009c0)=0xc) r4 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r6 = openat$vcsu(0xffffff9c, &(0x7f0000000440), 0x2000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000b00)=0xe4) sendmsg$nl_route(r1, &(0x7f0000000c00)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000480)=ANY=[@ANYBLOB="600000001800000425bd7000ffdbdf2502208002ff0400070020000008000300", @ANYRES32=r3, @ANYBLOB="14001680100003800a0002007b267b2e7d000000060015000400000008001000090000000800060004000000080010003a820106080019002da074c93a1c5de0534c67", @ANYRES32=r7, @ANYBLOB], 0x60}, 0x1, 0x0, 0x0, 0x4000001}, 0x8000) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) [ 285.662224][T10015] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 285.719742][T10016] loop0: detected capacity change from 0 to 1024 [ 285.756409][T10017] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 285.801955][T10016] EXT4-fs (loop0): Test dummy encryption mode enabled [ 285.811832][T10016] EXT4-fs (loop0): Test dummy encryption mode enabled [ 285.819265][T10016] EXT4-fs (loop0): unsupported descriptor size 0 [ 285.863613][T10015] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 13:25:49 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) dup3(r0, r1, 0x80000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r3, &(0x7f0000000180)='./file0\x00', 0x40003, 0x192) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4a24, 0x5, @remote, 0x102}, 0x1c) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$int_in(r4, 0x40000000af01, 0x0) ioctl$VHOST_NET_SET_BACKEND(r4, 0x4008af03, &(0x7f0000000000)) socketpair(0x29, 0xa, 0x0, &(0x7f0000000040)) 13:25:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:25:49 executing program 2: io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$dlm_control(0xffffff9c, &(0x7f0000000c40), 0x101580, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d40)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000cc0)=@RTM_GETNSID={0x24, 0x5a, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@NETNSA_FD={0x8}, @NETNSA_FD={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000010}, 0x4050) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000100001080048faf5ad0f659f78000000", @ANYRES32=0x0, @ANYBLOB="478800000000000008001b0000000000"], 0x28}}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000980)={@broadcast, @local}, &(0x7f00000009c0)=0xc) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = openat$vcsu(0xffffff9c, &(0x7f0000000440), 0x2000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@local, @in6=@loopback}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000b00)=0xe4) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) [ 286.500290][T10028] loop0: detected capacity change from 0 to 1024 [ 286.538328][T10029] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 286.658522][T10028] EXT4-fs (loop0): Test dummy encryption mode enabled [ 286.667428][T10028] EXT4-fs (loop0): Test dummy encryption mode enabled [ 286.674721][T10028] EXT4-fs (loop0): unsupported descriptor size 0 [ 286.708190][T10032] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 13:25:50 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) dup3(r0, r1, 0x80000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r3, &(0x7f0000000180)='./file0\x00', 0x40003, 0x192) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4a24, 0x5, @remote, 0x102}, 0x1c) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$int_in(r4, 0x40000000af01, 0x0) ioctl$VHOST_NET_SET_BACKEND(r4, 0x4008af03, &(0x7f0000000000)) [ 286.796414][T10029] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 13:25:50 executing program 2: io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$dlm_control(0xffffff9c, &(0x7f0000000c40), 0x101580, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d40)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000cc0)=@RTM_GETNSID={0x24, 0x5a, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@NETNSA_FD={0x8}, @NETNSA_FD={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000010}, 0x4050) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000100001080048faf5ad0f659f78000000", @ANYRES32=0x0, @ANYBLOB="478800000000000008001b0000000000"], 0x28}}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000980)={@broadcast, @local}, &(0x7f00000009c0)=0xc) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$vcsu(0xffffff9c, &(0x7f0000000440), 0x2000, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) 13:25:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a", 0x10, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) [ 287.332664][T10039] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 287.390844][T10044] loop0: detected capacity change from 0 to 1024 [ 287.408500][T10043] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 287.442626][T10044] EXT4-fs (loop0): Test dummy encryption mode enabled [ 287.453132][T10044] EXT4-fs (loop0): Test dummy encryption mode enabled [ 287.460186][T10044] EXT4-fs (loop0): unsupported descriptor size 0 [ 287.517919][T10039] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 13:25:51 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) dup3(r0, r1, 0x80000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r3, &(0x7f0000000180)='./file0\x00', 0x40003, 0x192) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4a24, 0x5, @remote, 0x102}, 0x1c) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$int_in(r4, 0x40000000af01, 0x0) 13:25:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a", 0x10, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) [ 287.965276][T10052] loop0: detected capacity change from 0 to 1024 [ 288.000921][T10052] EXT4-fs (loop0): Test dummy encryption mode enabled [ 288.010198][T10052] EXT4-fs (loop0): Test dummy encryption mode enabled [ 288.017398][T10052] EXT4-fs (loop0): unsupported descriptor size 0 [ 288.437736][T10037] IPVS: ftp: loaded support on port[0] = 21 [ 288.871028][T10037] chnl_net:caif_netlink_parms(): no params data found [ 289.127533][T10037] bridge0: port 1(bridge_slave_0) entered blocking state [ 289.135521][T10037] bridge0: port 1(bridge_slave_0) entered disabled state [ 289.145280][T10037] device bridge_slave_0 entered promiscuous mode [ 289.205480][T10037] bridge0: port 2(bridge_slave_1) entered blocking state [ 289.213031][T10037] bridge0: port 2(bridge_slave_1) entered disabled state [ 289.222892][T10037] device bridge_slave_1 entered promiscuous mode [ 289.284222][T10037] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 289.311761][T10037] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 289.369487][T10037] team0: Port device team_slave_0 added [ 289.383452][T10037] team0: Port device team_slave_1 added [ 289.441026][T10037] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 289.448681][T10037] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 289.475110][T10037] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 289.504129][T10037] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 289.511190][T10037] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 289.537891][T10037] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 289.773411][T10037] device hsr_slave_0 entered promiscuous mode [ 289.825957][T10037] device hsr_slave_1 entered promiscuous mode [ 289.887323][T10037] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 289.895577][T10037] Cannot create hsr debugfs directory [ 290.335848][ T2950] Bluetooth: hci3: command 0x0409 tx timeout [ 290.463742][T10037] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 290.500711][T10037] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 290.544991][T10037] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 290.574947][T10037] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 291.055546][T10037] 8021q: adding VLAN 0 to HW filter on device bond0 [ 291.124268][ T961] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 291.134609][ T961] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 291.165939][T10037] 8021q: adding VLAN 0 to HW filter on device team0 [ 291.222543][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 291.234055][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 291.243508][ T2950] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.250852][ T2950] bridge0: port 1(bridge_slave_0) entered forwarding state [ 291.326406][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 291.336034][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 291.347339][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 291.356875][ T2950] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.364343][ T2950] bridge0: port 2(bridge_slave_1) entered forwarding state [ 291.373695][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 291.384795][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 291.460021][T10037] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 291.470967][T10037] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 291.494590][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 291.505335][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 291.516841][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 291.527741][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 291.538468][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 291.548287][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 291.558973][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 291.568916][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 291.595000][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 291.604991][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 291.698727][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 291.706858][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 291.750544][T10037] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 291.822997][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 291.833638][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 291.910981][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 291.921303][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 291.947533][T10037] device veth0_vlan entered promiscuous mode [ 291.958109][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 291.968247][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 292.010298][T10037] device veth1_vlan entered promiscuous mode [ 292.112348][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 292.123088][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 292.149478][T10037] device veth0_macvtap entered promiscuous mode [ 292.188702][T10037] device veth1_macvtap entered promiscuous mode [ 292.251787][T10037] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 292.264967][T10037] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 292.276073][T10037] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 292.286810][T10037] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 292.300775][T10037] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 292.316181][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 292.325773][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 292.335286][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 292.345469][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 292.382999][T10037] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 292.394975][T10037] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 292.405159][T10037] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 292.415941][T10037] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 292.429953][T10037] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 292.438147][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 292.448425][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 292.464780][ T2950] Bluetooth: hci3: command 0x041b tx timeout [ 292.490979][T10037] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.500966][T10037] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.510234][T10037] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.519305][T10037] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.884056][ T26] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 292.893061][ T26] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 292.913273][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 293.111211][ T1162] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 293.119441][ T1162] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 293.135892][ T8943] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 13:25:57 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB="280000001000010b00f1a86795c0db24ad000000", @ANYRES32=0x0, @ANYBLOB="050200000000000008001b"], 0x28}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a45320, &(0x7f0000000040)={{0x0, 0x6e}, 'port0\x00', 0x0, 0x100008, 0x2, 0x2, 0x7, 0x0, 0x1, 0x0, 0xa, 0x29}) 13:25:57 executing program 2: io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$dlm_control(0xffffff9c, &(0x7f0000000c40), 0x101580, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d40)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000cc0)=@RTM_GETNSID={0x24, 0x5a, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@NETNSA_FD={0x8}, @NETNSA_FD={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000010}, 0x4050) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000100001080048faf5ad0f659f78000000", @ANYRES32=0x0, @ANYBLOB="478800000000000008001b0000000000"], 0x28}}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000980)={@broadcast, @local}, &(0x7f00000009c0)=0xc) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) 13:25:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a", 0x10, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:25:57 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) dup3(r0, r1, 0x80000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r3, &(0x7f0000000180)='./file0\x00', 0x40003, 0x192) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4a24, 0x5, @remote, 0x102}, 0x1c) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) [ 293.909037][T10296] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 293.945601][T10297] loop0: detected capacity change from 0 to 1024 [ 293.986544][T10297] EXT4-fs (loop0): Test dummy encryption mode enabled [ 293.995279][T10297] EXT4-fs (loop0): Test dummy encryption mode enabled [ 294.003990][T10297] EXT4-fs (loop0): unsupported descriptor size 0 [ 294.012582][T10300] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 13:25:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c89", 0x18, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) [ 294.175215][T10296] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 294.292559][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 294.300702][T10304] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 13:25:57 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) dup3(r0, r1, 0x80000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r3, &(0x7f0000000180)='./file0\x00', 0x40003, 0x192) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4a24, 0x5, @remote, 0x102}, 0x1c) 13:25:58 executing program 2: io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$dlm_control(0xffffff9c, &(0x7f0000000c40), 0x101580, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d40)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000cc0)=@RTM_GETNSID={0x24, 0x5a, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@NETNSA_FD={0x8}, @NETNSA_FD={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000010}, 0x4050) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000100001080048faf5ad0f659f78000000", @ANYRES32=0x0, @ANYBLOB="478800000000000008001b0000000000"], 0x28}}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000980)={@broadcast, @local}, &(0x7f00000009c0)=0xc) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) [ 294.495234][ T4672] Bluetooth: hci3: command 0x040f tx timeout [ 294.560029][T10304] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 294.600376][T10307] loop0: detected capacity change from 0 to 1024 [ 294.643757][T10307] EXT4-fs (loop0): Test dummy encryption mode enabled [ 294.652715][T10307] EXT4-fs (loop0): Test dummy encryption mode enabled [ 294.659644][T10307] EXT4-fs (loop0): unsupported descriptor size 0 [ 294.758686][T10314] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 294.823041][T10315] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 294.906474][T10314] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 13:25:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c89", 0x18, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:25:58 executing program 3: r0 = syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000000)='./file0\x00', 0x2002, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0400000900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)) open_tree(r0, &(0x7f0000000480)='./file0\x00', 0x0) r1 = syz_mount_image$jfs(&(0x7f0000000180), &(0x7f00000001c0)='./file0/file0\x00', 0x100, 0x9, &(0x7f0000001580)=[{&(0x7f0000000200)="e74452d47607ecfd3aa3f434baa1ec5e521ef3eecbe1e91798babcd9a1acd2bd911561042085e4c7dd5de00c1c04e7ee6098a167203343335940b1cadee70fa1f2ae831457751af6754f49d79759109d4b", 0x51, 0x3c}, {&(0x7f0000000300)="dcc92716c7c728b34e621941a70bab398d83a6be510a3cc28accac41e0db7b8e44193270ebef5ece316e4776e0ab14f86d670c8b6e3a8791aecc5576d87e987ef5ff1d", 0x43, 0xe2ff}, {&(0x7f0000000380)="42147faba41bc0aa79d3a437f5e1d79f0230fb34ef84ec9eaaae4877b23ed4365bffa8ff772053d26e4b05cc6c2491885e687e417714c0aeb320870493f32d36417afc188a54e9d511550d2a2cd84a4263d187a64c4a2689c9306926dc5ce4eb8230cbcabeb2", 0x66, 0x9}, {&(0x7f0000000400)="4d41963f8a8936b58eee0040186681c4c34b7bd9d8377a52750d6536948f9f48d9a98ecb59644e6baefeb22e349daf130733d7b02725b33784bf63", 0x3b, 0x1}, {&(0x7f0000000440)="fb388bfa93e845eb6bdf339a13baefff4af14c07cfbaffec22a87334a5", 0x1d, 0xffffffe0}, {&(0x7f0000000480), 0x0, 0xa7bd}, {&(0x7f00000004c0)="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", 0x1000, 0x6}, {&(0x7f00000014c0)="24757d77671dc69cbec9cd02342f7cf63b1f077ac064c099334a1a2639379e55132357dd7460b1a23e4806f4d5a0039e73bebe2475f16295cf86ecb2e179051d6c57bf782e77d51171b8ab76dd0aa335ecd94aed0a4d93bf8834bf5a204b2364c1ba0d7f4fdb0c75e92a34e19d", 0x6d, 0x1}, {&(0x7f0000001540), 0x0, 0x81}], 0x890000, &(0x7f0000001600)={[{@nointegrity}, {@uid}, {@nointegrity}], [{@obj_user={'obj_user', 0x3d, '/dev/loop'}}, {@dont_hash}]}) openat(r1, &(0x7f0000001680)='./file0\x00', 0x800, 0x200) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000280)='.\x00', &(0x7f00000002c0)='msdos\x00', 0x0, 0x0) syz_mount_image$jfs(&(0x7f0000001540), &(0x7f00000016c0)='./file0/file0\x00', 0x4, 0xa, &(0x7f0000001d40)=[{&(0x7f0000001700)="2e3d1571c4ae166a74a716bb309b01892947c1963ef18a3f1013e9ed1e8bed43e4a3edde1e45202be42ea38035ca779b6c0c3166226419963e08d7ed42c46af871950cf8d79ebca566f62cf7e80afa1dc68e83c1f2406248ba415acd3e503e5ee4c31ed1c33e7be1160eebfd9b9d21f617769ba61c9c1f20ad3e58a82906cfe5f7cf9da376ea8b73e4f241c491acc887837e92da78193ff9", 0x98, 0x7}, {&(0x7f00000017c0)="a4852bb96afca054f67fdc1fddda01e7375c9810fd2d241d21214b2faa438695b35eadea0381b3ea43606b1712a937b53521d98884de4bf784dfa24a2d0645c84b2c85fd7529c23f6e060e056cdf4d8bbd9d294c06c1917139185d305a08c2779de8121df69038ecf272fb88a20366a69f2e8b45797e3d23da8683775af73f88b936e142b90dec9aa89b0cb63aaa74e0871fe892fadeeff8e029cf4421821583e3d8b2df3699035080fc5afe2c671cb1c2d5b5736521712b6532cd228ae2066603e85fff6cd8c6c5768fb880ae3fc5ed736c32188366395971d388763d2d2ae3c123898c09ca911a9688ca05f466f3d3d11a26", 0xf3, 0x5}, {&(0x7f00000018c0)="49b3daf8dcc6efc1ba1ce8ee9b711c6da1a82b3e07a2e779252e58deba5e786c713fb4ad60ee9a18d59e2d6985e4964f9920411b", 0x34, 0xca}, {&(0x7f0000001900)="fdd74daefed79bdef70f556cfced46995976d3baaec017307aa9e98ce5117be0246165cd5fdcbc8a2fcc0f243caf9245128da17d4d781e165363c80d9bff2ad994ac91e848e81d7c29298a369ccf767268bc94b2c3d4da0e900f", 0x5a, 0x3}, {&(0x7f0000001980)="0e2a4e707719e7dd7760b711e7ddc0e724dd487e1ec86fbd53b3c553d5744b", 0x1f, 0x8}, {&(0x7f00000019c0)="8ab5df00eb26381338dc9f0d48895225e48f8f4aaaf63d5d6206d68a79a59e3a2c09d116591036c986643d9f7608ab08a5c54fcd55f0af6de428589f5fb748b9d1eb4466261f23329c3c59fc61409ce5f2f98d7e447b0f2850e3", 0x5a, 0x4e}, {&(0x7f0000001a40)="ab97f6f197599c7487576fda52cf560510b47bbac988a591d5a8414a47ebe029db2e0cc7097bcee2ca8f72908364667a8ee84775068592996d5cba6d5b0ad5ffd4a2f7e2b1cfd7a33e84aa3adea4c28b651f216ad4b06634d8d02891ffb3cab110b2101cb3141cf418a8faf120d2b14a0212ba7b1b6ef6485fdee0c91aa25abc952cabcd39bc", 0x86, 0x6}, {&(0x7f0000001b00)="a5a47ba1adbdd3794ffaff810da387e03f0ca566d1bce40e613dfca0b0c6503e012ae36b4665a5753712632284a38092ad9dc5718d640329f80ba1e341b350121ab428baa954ef26c1678e0de3978bc08b899e01ad8c89b2be6424b39d8c1f656a94c1fada8c41955d016e261feb23a24bf5e2ed7db053d5edc673e3de77aeac68f1d2b9c31b5c2bf1cb70fdfe959c0435907a8f9cbd464ce41f2e5cda9ca83d1bbdfb4f27c1ec5dfc82032b7d6a6a6c4a532734aad0351077a2003a1687f975fdf14e2403", 0xc5, 0xee}, {&(0x7f0000001c00)="579acc3edb61034c8befb846b6cdf911438c31bf5b1b60d20177b1ec6aa2167f96d017e107b7ffff011474e4ca020d9ef7fa944c43497b3e27", 0x39, 0x7fff}, {&(0x7f0000001c40)="f472b49fdd5c50188bdc9b7dcf86c29d33a2d5b301d1e6bda20ecfe4e899e4cc672ab4190815dc17def4a715e6597d8f22bccdfb1604e16b490735f053b9cd38f09214e0cc9132b00de544d78b025ffa7ede3c63548201d53c638c480075e6aa1a4a95ad20139f7971fc0eb6b071100731db3f8ce3ba0eb6dbc350ec897db1dab53a082cc9fae4e38f2e6ae606aa9d42c9845dd07f4b2b2b753dbe8d1323557a296023216f4bf4889a557e646b194f5c66d7d16bb0baf885f4a300c8a9fc0377da849ce61af5922f3984d09b84578b26f1d24e90dcbe16149549", 0xda, 0x81}], 0x180080, &(0x7f0000001dc0)={[{@resize_size}, {@nodiscard}, {@gid={'gid', 0x3d, 0xee01}}, {@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@usrquota}], [{@permit_directio}, {@smackfstransmute={'smackfstransmute', 0x3d, 'nointegrity'}}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x66, 0x30, 0x35, 0x2, 0x37, 0x37, 0x61], 0x2d, [0x35, 0x51, 0x66, 0x64], 0x2d, [0x32, 0x34, 0x30, 0x33], 0x2d, [0x38, 0x62, 0x37, 0x33], 0x2d, [0x35, 0x30, 0x31, 0x66, 0xed, 0x62, 0x30, 0xc1460d517104aa82]}}}]}) 13:25:58 executing program 2: io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$dlm_control(0xffffff9c, &(0x7f0000000c40), 0x101580, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d40)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000cc0)=@RTM_GETNSID={0x24, 0x5a, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@NETNSA_FD={0x8}, @NETNSA_FD={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000010}, 0x4050) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000100001080048faf5ad0f659f78000000", @ANYRES32=0x0, @ANYBLOB="478800000000000008001b0000000000"], 0x28}}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000980)={@broadcast, @local}, &(0x7f00000009c0)=0xc) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) 13:25:58 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) dup3(r0, r1, 0x80000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r3, &(0x7f0000000180)='./file0\x00', 0x40003, 0x192) [ 295.306180][T10319] loop0: detected capacity change from 0 to 1024 [ 295.347537][T10319] EXT4-fs (loop0): Test dummy encryption mode enabled [ 295.356520][T10319] EXT4-fs (loop0): Test dummy encryption mode enabled [ 295.363809][T10319] EXT4-fs (loop0): unsupported descriptor size 0 [ 295.407323][T10322] loop3: detected capacity change from 0 to 16 [ 295.447787][T10322] FAT-fs (loop3): Directory bread(block 2571) failed [ 295.456790][T10322] FAT-fs (loop3): Directory bread(block 2572) failed [ 295.463875][T10322] FAT-fs (loop3): Directory bread(block 2573) failed [ 295.470717][T10322] FAT-fs (loop3): Directory bread(block 2574) failed [ 295.477757][T10322] FAT-fs (loop3): Directory bread(block 2575) failed [ 295.484832][T10322] FAT-fs (loop3): Directory bread(block 2576) failed [ 295.491679][T10322] FAT-fs (loop3): Directory bread(block 2577) failed [ 295.498735][T10322] FAT-fs (loop3): Directory bread(block 2578) failed [ 295.505789][T10322] FAT-fs (loop3): Directory bread(block 2579) failed [ 295.512867][T10322] FAT-fs (loop3): Directory bread(block 2580) failed [ 295.552910][T10329] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 13:25:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c89", 0x18, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) [ 295.683112][T10332] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 295.773570][T10329] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 13:25:59 executing program 3: r0 = creat(&(0x7f0000000540)='./file0/file0\x00', 0x88) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000580)={0x1, 0x0, 0x3, 0x8, 0x16, "3ce036794e8037f152ba1a5032abd61089190d"}) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000700), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="6e66733d6e6f7374616c655f726f2c005bc1b76c61eb4e230bfa33c4a6f6fbb88175ec67aac14b1485d8ff4abe33647e144d4e5ec61abf34857e29a74868aeb7f0f8f31eb824e115faff3fc816d8fbf553b75a78e1db204c37e948368cad7ee9ecb735c2011359c59635e845393df775aad198846a2bc7d598a52fd8296124edaa07cc38ce919bbb7f61a372247c73e4910b101eeeb8965d468b37d83db11641dcd746e007f63271e21eecd6"]) getxattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)=@known='user.incfs.id\x00', &(0x7f0000000140)=""/131, 0x83) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@private}}, &(0x7f0000000440)=0xe4) mount$overlay(0x0, &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300), 0x40, &(0x7f0000000480)={[{@index_on}, {@upperdir={'upperdir', 0x3d, './file0/file0'}}, {@nfs_export_on}, {@xino_auto}, {@index_off}, {@lowerdir={'lowerdir', 0x3d, './file0/file0'}}, {@nfs_export_off}, {@xino_on}], [{@fowner_lt={'fowner<', r1}}]}) chdir(&(0x7f0000000080)='./file0\x00') 13:25:59 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) dup3(r0, r1, 0x80000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 13:25:59 executing program 2: io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$dlm_control(0xffffff9c, &(0x7f0000000c40), 0x101580, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d40)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000cc0)=@RTM_GETNSID={0x24, 0x5a, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@NETNSA_FD={0x8}, @NETNSA_FD={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000010}, 0x4050) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000100001080048faf5ad0f659f78000000", @ANYRES32=0x0, @ANYBLOB="478800000000000008001b0000000000"], 0x28}}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000980)={@broadcast, @local}, &(0x7f00000009c0)=0xc) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) [ 296.135955][T10337] loop0: detected capacity change from 0 to 1024 [ 296.211677][T10337] EXT4-fs (loop0): Test dummy encryption mode enabled [ 296.220859][T10337] EXT4-fs (loop0): Test dummy encryption mode enabled [ 296.228217][T10337] EXT4-fs (loop0): unsupported descriptor size 0 [ 296.319458][T10343] FAT-fs (loop3): bogus number of reserved sectors [ 296.326552][T10343] FAT-fs (loop3): Can't find a valid FAT filesystem [ 296.429808][T10348] FAT-fs (loop3): bogus number of reserved sectors [ 296.436770][T10348] FAT-fs (loop3): Can't find a valid FAT filesystem [ 296.578434][T10355] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 296.598082][ T4672] Bluetooth: hci3: command 0x0419 tx timeout [ 296.686024][T10356] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 296.704925][T10355] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 13:26:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045", 0x1c, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:00 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x27c, 0x0, 0x5802, 0x294, 0xc8, 0x294, 0x1b4, 0x378, 0x378, 0x1b4, 0x378, 0x3, 0x0, {[{{@ipv6={@mcast2, @dev, [0x0, 0xff], [], 'ip6tnl0\x00', 'team0\x00', {}, {}, 0x0, 0x8}, 0x0, 0xa4, 0xc8, 0x52020000}, @common=@unspec=@STANDARD={0x24, '\x00', 0x0, 0xc8}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private0, [], [], 'rose0\x00', 'team_slave_1\x00'}, 0x0, 0xa4, 0xec}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d8) 13:26:00 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) dup3(r0, r1, 0x80000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) 13:26:00 executing program 2: io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$dlm_control(0xffffff9c, &(0x7f0000000c40), 0x101580, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d40)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000cc0)=@RTM_GETNSID={0x24, 0x5a, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@NETNSA_FD={0x8}, @NETNSA_FD={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000010}, 0x4050) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000100001080048faf5ad0f659f78000000", @ANYRES32=0x0, @ANYBLOB="478800000000000008001b0000000000"], 0x28}}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000980)={@broadcast, @local}, &(0x7f00000009c0)=0xc) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) [ 297.146644][T10362] loop0: detected capacity change from 0 to 1024 [ 297.190843][T10365] xt_CT: You must specify a L4 protocol and not use inversions on it [ 297.223454][T10362] EXT4-fs (loop0): Test dummy encryption mode enabled [ 297.232550][T10362] EXT4-fs (loop0): Test dummy encryption mode enabled [ 297.239484][T10362] EXT4-fs (loop0): unsupported descriptor size 0 [ 297.420088][T10368] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 13:26:01 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) dup3(r0, r1, 0x80000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) [ 297.477554][T10369] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 297.611258][T10368] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 13:26:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045", 0x1c, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:01 executing program 3: r0 = perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r2, 0x8200) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000000500), 0x0, 0x0, 0x0, 0x20008040}, 0x8000) write$binfmt_misc(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0xad) write$cgroup_type(r2, &(0x7f0000000200), 0x175d900f) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x7, 0xfd, 0x1, 0x0, 0x0, 0x1000, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0xcc) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040), &(0x7f00000004c0), 0x80000001, r3}, 0x38) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000500)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, r3, r4], 0x6) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000980)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000000800)=[{&(0x7f0000000a80)="538e2c69b100a4a8c13b3922819582904da98e71254cebde56ef8a4e369da7cf174786a334c2702eb192238f0c071f5882c30f26b488d945373790e0509bb730dd9ebcfa431fab5772748763b0e53a8e2062148fbfeee00fc9e19aa65f8205cd6b", 0x61}, {0x0}, {&(0x7f0000000240)="430fb616da34a87f58fae07fee09c109aab350224915b5dc111ee3a0accdfdfd84146b7a85a7ef81c08cc996c8e0f3f281f27eba1d0a135e0177582128a2d35efce0b632", 0x44}, {&(0x7f0000000740)="7d6d8e999a4a06d4657e85d793806e1faa28e7f9a462a9f79d22a56e8c0831f424a9b7e194cfee2e0a0781deafe0c00a8e4e843e1ef24842442b43469350a72f008e78a07b9df7eaef2798e62fd2eeb28b026499e38b091322dadbf2a8c2c5b97990976904c43bd35768c5ee11f8f1e1484941197ef0a76c9f7d0738e9e9368bcd18e6739701373ef489cfe16b6f789e0388e06ec7d8b2dd31", 0x99}, {&(0x7f0000000d00)="0541bb32b475a51582cfa5ed6db3c95ea3cb94e11b7d2716ec7caa50a60cb164b8046a85842bf0583888576842a7294b103056359a4149f3af827fb72bf17049e662514b79676770c9fd80545280e50261eeeafeba1dd7a4bf4266d2fe42e6bdcb2a6376b40543153606232338ea3209a9138a8735a1c01f0b8d6c007e94e82fa6289106e2b658582af6ac7099da36b30447d11df688d63b358ba81bf8f9eaeffe19eecc43316a54fe3e16c9bf5011a33f6a8039d3a96c1681916158de124d8959d03bb3000000000000", 0xca}, {&(0x7f0000000880)="9c1fea38ac34e7a4ea6152295a18305a9e72cc32e4e1bc278afcba09e4a9a8a60e6db37ea652775e8b2dde0b111e55f48a7f7f654234b91f633f91cd6ccc2de877e1e5260ea49f08f1a0f4da7748b189156c8615d06a7ce01ea05eae2f8b6166814159e311fe4b0472340262e33c", 0x6e}, {&(0x7f00000001c0)="214e39d6460e47f13497eb32b0985fcaa6ee1ae241475b634bf0ff0f708bf9606265431fe3c0aa02", 0x28}], 0x7}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) setresgid(0x0, 0xee01, r5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000140)='system.posix_acl_access\x00', &(0x7f0000000340)={{}, {0x1, 0x9}, [{0x2, 0x0, 0xffffffffffffffff}], {0x4, 0x3}, [{0x8, 0x1, 0xee00}, {0x8, 0x2, 0xffffffffffffffff}, {}, {0x8, 0x7, 0xee01}, {0x8, 0x1, 0xee00}, {0x8, 0x5, 0xffffffffffffffff}, {0x8, 0x2}, {0x8, 0x2, r5}, {0x8, 0x4, r6}, {0x8, 0x7, 0xee00}], {}, {0x20, 0x4}}, 0x7c, 0x2) 13:26:01 executing program 2: io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$dlm_control(0xffffff9c, &(0x7f0000000c40), 0x101580, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d40)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000cc0)=@RTM_GETNSID={0x24, 0x5a, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@NETNSA_FD={0x8}, @NETNSA_FD={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000010}, 0x4050) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000100001080048faf5ad0f659f78000000", @ANYRES32=0x0, @ANYBLOB="478800000000000008001b0000000000"], 0x28}}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000980)={@broadcast, @local}, &(0x7f00000009c0)=0xc) openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) [ 298.008008][T10375] loop0: detected capacity change from 0 to 1024 [ 298.059736][T10375] EXT4-fs (loop0): Test dummy encryption mode enabled [ 298.068487][T10375] EXT4-fs (loop0): Test dummy encryption mode enabled [ 298.075680][T10375] EXT4-fs (loop0): unsupported descriptor size 0 13:26:01 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) dup3(r0, r1, 0x80000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045", 0x1c, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) [ 298.507013][T10385] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 298.609250][T10386] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 298.690175][T10385] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 298.823374][ T35] audit: type=1800 audit(1620307562.400:9): pid=10379 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=14075 res=0 errno=0 13:26:02 executing program 2: io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$dlm_control(0xffffff9c, &(0x7f0000000c40), 0x101580, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d40)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000cc0)=@RTM_GETNSID={0x24, 0x5a, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@NETNSA_FD={0x8}, @NETNSA_FD={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000010}, 0x4050) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000100001080048faf5ad0f659f78000000", @ANYRES32=0x0, @ANYBLOB="478800000000000008001b0000000000"], 0x28}}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000980)={@broadcast, @local}, &(0x7f00000009c0)=0xc) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) 13:26:02 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) dup3(r0, r1, 0x80000) socket$inet6_udp(0xa, 0x2, 0x0) 13:26:02 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x6, 0x660d01) ioctl$SG_SCSI_RESET(r0, 0x2286, 0x816d000) [ 299.192863][T10393] loop0: detected capacity change from 0 to 1024 [ 299.241308][T10393] EXT4-fs (loop0): Test dummy encryption mode enabled [ 299.250219][T10393] EXT4-fs (loop0): Test dummy encryption mode enabled [ 299.257401][T10393] EXT4-fs (loop0): unsupported descriptor size 0 [ 299.481574][T10399] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 299.569003][T10402] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 299.642443][T10399] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 13:26:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f2800450100", 0x1e, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:03 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) dup3(r0, r1, 0x80000) 13:26:03 executing program 3: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="7400000001010b"], 0x74}}, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r1, 0xc0345642, &(0x7f0000000040)={0x0, "252547daede03aba837bc96bb2568b338620f0769e5abf1e4fbddb5ffe6955fa", 0x3, 0x1}) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, 0x0, &(0x7f0000000000)) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xffad) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r4, 0x0) preadv(r4, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 13:26:03 executing program 2: io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$dlm_control(0xffffff9c, &(0x7f0000000c40), 0x101580, 0x0) sendmsg$nl_route(r2, &(0x7f0000000d40)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000cc0)=@RTM_GETNSID={0x24, 0x5a, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@NETNSA_FD={0x8}, @NETNSA_FD={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000010}, 0x4050) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="28000000100001080048faf5ad0f659f78000000", @ANYRES32=0x0, @ANYBLOB="478800000000000008001b0000000000"], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) [ 300.134846][T10407] loop0: detected capacity change from 0 to 1024 [ 300.210212][T10407] EXT4-fs (loop0): Test dummy encryption mode enabled [ 300.219527][T10407] EXT4-fs (loop0): Test dummy encryption mode enabled [ 300.226690][T10407] EXT4-fs (loop0): unsupported descriptor size 0 13:26:04 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:04 executing program 3: lsetxattr$system_posix_acl(&(0x7f0000000400)='.\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f00000000c0)={{}, {}, [{0x2, 0x0, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x0, 0xee00}, {}], {}, [{}, {}, {}]}, 0x5c, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) [ 300.486673][T10418] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 300.521007][T10419] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 300.599290][T10418] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 13:26:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f2800450100", 0x1e, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:04 executing program 2: io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) socket$nl_route(0x10, 0x3, 0x0) r1 = openat$dlm_control(0xffffff9c, &(0x7f0000000c40), 0x101580, 0x0) sendmsg$nl_route(r1, &(0x7f0000000d40)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000d00)={&(0x7f0000000cc0)=@RTM_GETNSID={0x24, 0x5a, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@NETNSA_FD={0x8}, @NETNSA_FD={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000010}, 0x4050) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) [ 301.009182][T10427] loop0: detected capacity change from 0 to 1024 [ 301.100565][T10431] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 301.128486][T10427] EXT4-fs (loop0): Test dummy encryption mode enabled [ 301.137506][T10427] EXT4-fs (loop0): Test dummy encryption mode enabled [ 301.144660][T10427] EXT4-fs (loop0): unsupported descriptor size 0 13:26:04 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:04 executing program 3: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vxcan1\x00'}) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x84}, {0x7}, {0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)) 13:26:04 executing program 2: io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) socket$nl_route(0x10, 0x3, 0x0) openat$dlm_control(0xffffff9c, &(0x7f0000000c40), 0x101580, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) 13:26:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f2800450100", 0x1e, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:05 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 301.718560][ T35] audit: type=1326 audit(1620307565.290:10): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10436 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f88549 code=0x0 [ 301.722693][T10439] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 301.866569][T10443] loop0: detected capacity change from 0 to 1024 [ 301.897430][T10443] EXT4-fs (loop0): Test dummy encryption mode enabled [ 301.906061][T10443] EXT4-fs (loop0): Test dummy encryption mode enabled [ 301.913294][T10443] EXT4-fs (loop0): unsupported descriptor size 0 13:26:05 executing program 2: io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) 13:26:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:05 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 302.411085][T10451] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 302.473728][T10453] loop0: detected capacity change from 0 to 1024 [ 302.507061][ T35] audit: type=1326 audit(1620307566.080:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10436 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=40000003 syscall=403 compat=1 ip=0xf7f88549 code=0x0 [ 302.589939][T10453] EXT4-fs (loop0): Test dummy encryption mode enabled [ 302.598798][T10453] EXT4-fs (loop0): Test dummy encryption mode enabled [ 302.607381][T10453] EXT4-fs (loop0): unsupported descriptor size 0 13:26:06 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f00000000c0)={0x2, 0xba, "4044765b1bb6b3d07960a26c40d6781b9a425fdb451e7d7fd28c79ccd1091e491e419ac2d72ea92015c1d3bd72835ef1ee45218752f421a9d290efdd97f7227b1532c1f3a308c34c7d7e8b5fcd0ecdd65d1bde34e9364f9ffc5c389eaed22f091c86a238fdf7d71fcd35f77ba328263bf93ec2c2ed71e8573785f2b65bf0cdf0bbf69599bf6f489fedb84ecf6234e888f2af913fcd8d59a7923a54cc9ad54cbb5763345fe3c4c51430a0369cbf1adf021d073d45e49abee096bd"}) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r2 = openat$dlm_control(0xffffff9c, &(0x7f0000000040), 0x86000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f0000000200)=[@in6={0xa, 0x4e23, 0x5, @private1={0xfc, 0x1, '\x00', 0x1}, 0x5}, @in6={0xa, 0x4e22, 0x1, @loopback, 0x8000}, @in={0x2, 0x4e21, @empty}, @in6={0xa, 0x4e20, 0x5adb, @mcast2, 0x3}, @in={0x2, 0x4e21, @local}], 0x74) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x1000002, 0x31, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) 13:26:06 executing program 2: io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) 13:26:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) [ 303.024662][T10465] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 13:26:06 executing program 1: socket$inet6_sctp(0xa, 0x1, 0x84) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:06 executing program 2: io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) 13:26:06 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x4e24, 0x6, @empty, 0xdb}}, 0x0, 0x0, 0x25, 0x0, "339eecc7e4f30e524dc23c1dce4cdcd0441e5b9065e3671b63e8f058ac95f52d0915b3b9af145ed3b8d173312db928f1dbc40e12e97aac1ce0e25ac176ef546c3d6d5e10109cc145f288cb9dd3a3f561"}, 0xd8) socket$kcm(0x10, 0x2, 0x10) r1 = openat$autofs(0xffffff9c, &(0x7f0000000080), 0x420100, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x46}, 0x0) [ 303.390948][T10470] loop0: detected capacity change from 0 to 1024 [ 303.500060][T10470] EXT4-fs (loop0): Test dummy encryption mode enabled [ 303.508971][T10470] EXT4-fs (loop0): Test dummy encryption mode enabled [ 303.516714][T10470] EXT4-fs (loop0): unsupported descriptor size 0 13:26:07 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 303.773311][T10478] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 13:26:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:07 executing program 3: getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0101000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=@newqdisc={0x44, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_RSC={0x10}}}]}, 0x44}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000900)=@newtfilter={0x24, 0x2c, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0x6, 0xffff}, {0x0, 0xffe0}}}, 0x24}}, 0x0) 13:26:07 executing program 2: io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) 13:26:07 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 304.317584][T10485] loop0: detected capacity change from 0 to 1024 [ 304.344028][T10485] EXT4-fs (loop0): Test dummy encryption mode enabled [ 304.352957][T10485] EXT4-fs (loop0): Test dummy encryption mode enabled [ 304.359883][T10485] EXT4-fs (loop0): unsupported descriptor size 0 [ 304.434936][T10491] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 304.462699][T10492] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 13:26:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000180)=[{&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:08 executing program 2: io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) 13:26:08 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:08 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x80000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000100)) r2 = openat$bsg(0xffffff9c, &(0x7f0000000000), 0x40000, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x100010, r0, 0xa49b0000) ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f0000000040)={0xffff, 0xfffe, 0x3, 0x2, 0xfff, 0x6}) [ 304.923765][T10498] loop0: detected capacity change from 0 to 1024 [ 304.991268][T10498] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 305.118660][T10505] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 13:26:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000180)=[{&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:08 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:08 executing program 2: io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) 13:26:09 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000), 0x0, 0x1c0}]) syz_mount_image$ufs(&(0x7f0000000940), &(0x7f0000000980)='./file0\x00', 0x0, 0x2, &(0x7f0000000b80)=[{0x0, 0x0, 0x80000000}, {&(0x7f0000000a80), 0x0, 0x2}], 0x0, &(0x7f0000000bc0)={[{}], [{@seclabel}]}) syz_mount_image$jfs(&(0x7f0000000240), 0x0, 0x0, 0x6, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000400), 0x0, 0x5}, {0x0, 0x0, 0x9}, {0x0, 0x0, 0xb741}, {&(0x7f0000000600)="d699b51eaea25ac93fb172a50eac7a6f903b817569ed1494cc14424c686a000b22321bfe18140a23d6337736c5da44ee8d1a38a2ce60bbe19157f974e1b26d3cf58d4515a7f4d5d08f167a8622596ff521de36b02cb413ba6c330fd0d001eac15b0115ec4e", 0x65, 0x5}, {0x0}], 0x0, &(0x7f0000000800)={[{@resize_size={'resize', 0x3d, 0x5da}}, {@resize_size}, {@errors_remount}, {@nodiscard}], [{@appraise}, {@smackfsroot={'smackfsroot', 0x3d, '$'}}]}) syz_read_part_table(0x1, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="2149910dc73cdac9d78ddc3c78113189f52ecc217b438a3db35ef925b0b0b5a6d26000a349d6d394d67ca712d0f821e0a95a3f44ab54abdb0fb68df43a285389290bdc2cdbf9bb1d90c1a4fe65b64ed1ba9e2701e0bd47ad456c9cc33447124caf3871584bf2cbbfd3649929848a30eb60f2a92bc9a9f3557dfe51e829b12dfed9e47768faf0e88cd15b774546bdb7ae485df582895888fdce12c8a7a5e47f7cc8c2f66ef0b08fc30df35947e89147ca0f924261", 0xb4, 0x1}]) 13:26:09 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) [ 305.726030][T10514] loop0: detected capacity change from 0 to 1024 [ 305.831636][T10514] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 13:26:09 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 13:26:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000180)=[{&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:09 executing program 2: io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) [ 306.112713][T10523] loop3: detected capacity change from 0 to 1 [ 306.280794][T10523] Dev loop3: unable to read RDB block 1 [ 306.288658][T10523] loop3: unable to read partition table [ 306.346048][T10523] loop3: partition table beyond EOD, truncated [ 306.352752][T10523] loop_reread_partitions: partition scan of loop3 () failed (rc=-5) 13:26:10 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 13:26:10 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x14, 0x211, 0x0, 0x0, {0x28}}, 0x14}}, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/65, 0x41}], 0x1, 0x7, 0x6) [ 306.664906][T10535] loop0: detected capacity change from 0 to 1024 13:26:10 executing program 2: io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) [ 306.745030][T10535] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 13:26:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:10 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x2a0, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0xcc, 0x114, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2fc) 13:26:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x618, 0x46c, 0x59000000, 0x294, 0x0, 0x294, 0x550, 0x378, 0x378, 0x550, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x424, 0x46c, 0x52020000, {}, [@common=@inet=@hashlimit2={{0x150}, {'batadv_slave_1\x00', {0xe2, 0x0, 0x63, 0x0, 0x0, 0x1, 0x401}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa4, 0xe4}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "4e899bcb6521be210e163fb1aa9943496247275b584f1597981189c633c9"}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x674) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000000, 0x4000010, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x6886, &(0x7f0000000680)={0x0, 0x2509, 0x8, 0x2, 0x2d7}, &(0x7f0000ff3000/0xd000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000700), &(0x7f0000000740)=0x0) r3 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r4 = io_uring_setup(0x5b4, &(0x7f0000000000)) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0xa, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0xa, 0x0, r5) syz_io_uring_submit(r1, r2, &(0x7f00000007c0)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, r3, &(0x7f0000000780), 0x0, 0x0, 0x80800, 0x0, {0x0, r5}}, 0x0) r6 = fsmount(0xffffffffffffffff, 0x0, 0x83) getpeername$packet(r6, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000840)=0x14) 13:26:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) [ 307.416293][T10550] loop0: detected capacity change from 0 to 1024 13:26:11 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x2a0, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0xcc, 0x114, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2fc) [ 307.510014][T10550] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 307.741887][T10562] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 13:26:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7}, 0x10) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=@getlink={0x28, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_GSO_MAX_SIZE={0x5b, 0x3}]}, 0x28}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8847}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="240000002a00010029bd7000fddbdf2500000000998dadac23404d8033ec2b536257732a0abded38d5c5b85113a3fa3b79d0dcf8ed39cc0153212970cd8f5871609d4f92e9fcda2e46c657c14b5b5bd24ad152e602ec3ea2ec6a617acde5d5dc49de54ce105cb5676eacf04e17aff56b2a6207", @ANYRES32=0x0, @ANYBLOB="0f000f0002000f000000f1ff"], 0x24}, 0x1, 0x0, 0x0, 0x20004090}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=@mpls_newroute={0xa8, 0x18, 0x200, 0x70bd27, 0x25dfdbfb, {0x1c, 0x14, 0x14, 0x2, 0xff, 0x2, 0xff, 0x8, 0x1400}, [@RTA_OIF={0x8}, @RTA_NEWDST={0x84, 0x13, [{0x7ff, 0x0, 0x1}, {0x5, 0x0, 0x1}, {0xfff96, 0x0, 0x1}, {0x7}, {0x2c}, {0xfff}, {0x80}, {0x8}, {0x3}, {0x1c000, 0x0, 0x1}, {0x7}, {0xffff}, {0x1f}, {0x1f, 0x0, 0x1}, {0x2, 0x0, 0x1}, {0x46eb7, 0x0, 0x1}, {0x7}, {0x620, 0x0, 0x1}, {0x8001}, {0x48a}, {0x22, 0x0, 0x1}, {0x4}, {0x20}, {0x9}, {0x3f, 0x0, 0x1}, {0x2a5}, {0x4}, {0x101}, {0x6, 0x0, 0x1}, {0x81}, {0x200}, {0x100, 0x0, 0x1}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x11}, 0x40) 13:26:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) 13:26:11 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x2a0, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0xcc, 0x114, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2fc) [ 308.205428][T10568] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 308.221454][T10570] loop0: detected capacity change from 0 to 1024 [ 308.265731][T10570] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 308.285742][T10573] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 308.401699][T10575] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 308.410578][T10575] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 13:26:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) [ 308.617369][T10575] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 13:26:12 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 308.710908][T10573] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 308.831386][T10581] loop0: detected capacity change from 0 to 1024 13:26:12 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x3000000}, 0x0, 0x0, 0x0, 0x3, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='numa_maps\x00') r1 = signalfd(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x3, r1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x20, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc20000000000", 0x130, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0}, {&(0x7f0000011800)="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", 0x15d, 0x500000}, {&(0x7f0000011a00)="000000000000000000000000000000000000000004000000000000000001000000000000009050000000000000000000000000000010000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000040000", 0x66, 0x500560}, {&(0x7f0000011b00)="00000000000000000000000400000000000000000000000000000000a05000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000004", 0x5b, 0x500720}, {&(0x7f0000011c00)="000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x38, 0x500840}, {&(0x7f0000011d00)="00000600000000000000000000000000000000605000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000006", 0x52, 0x5008e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000050000000000000084ffffffffffffffff0000000000000000000007000264656661756c74000000000000000002002e2e03000000000000000000000000000000000000000000000000100000000000000000000000000000010000000000000000000000ed41000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005bbc645f00000000000000005bbc645f00000000000000005bbc645f00000000000000005bbc645f000000000000000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed410000000000000000000000000080ffffffff", 0x132, 0x9}, {&(0x7f0000012000)="000000000000000000000600000000000000000100000000000000d05000000000000000000000000000003000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000106000000000000000b4f7fb0d0124f978a408dac5052e4f6000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000005cbc645f00000000c7a335155bbc645f00", 0xc2, 0x500b60}, {&(0x7f0000012100)="000000000000000000070064656661756c7401000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x48, 0x500c80}, {&(0x7f0000012200)="000000000000000000000000000000000000060000000000000000000000000000000000510000000000000000000000000000100000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000600", 0x63, 0x500d20}, {&(0x7f0000012300)="00000000000000000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x3f, 0x500e40}, {&(0x7f0000012400)="0000000000000000000700000000000000000000000000000000105000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000007", 0x59, 0x500ee0}, {&(0x7f0000012500)="46ea879d00000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200105000000000000100000000000001e1ee0d5d64d84a64be712c7636496d14070000000000000002000000000000000e000000000000100000000000c00000400000000000830f0000180000000010100000000000a90000000000000000620f0000210000000000500000000000a90000000000000000410f0000210000000000500000000000c00000190000000000290f0000180000000010500000000000a90000000000000000080f0000210000000030500000000000a80030000000000000d30e0000350000000060500000000000a90000000000000000b20e0000210000000090500000000000a90000000000000000910e00002100000000a0500000000000a90000000000000000700e00002100000000c0500000000000a900000000000000004f0e00002100000000d0500000000000a901000000000000002e0e00002100000000e0500000000000a900000000000000000d0e0000210000000000510000000000a90000000000000000ec0d0000210000000000690000000000c00000190000000000d40d000018", 0x1c0, 0x501000}, {&(0x7f0000012700)="0000010000000000000500000000000000010000000000000006000000000000000200000000000000b00400000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000004000000000000000200000000000000b00900000000000000010000000000000004000000000000000200000000000000b0f7ffffffffffffff010000000000000006000000000000000200000000000000b00700000000000000010000000000000006000000000000000100000000000000b205000000000000000501000000000000000000000000000001000000010000000000000007000000000000000200000000000000b0020000000000000000c000000000000000010000000000000500000000000000010000000000000007000000000000000200000000000000b00100000000000000010000000000000004000000000000000200000000000000b003000000000000000010000000000000000100000000000002", 0x1b9, 0x501e40}, {&(0x7f0000012d00)="f37badf500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200605000000000000100000000000001e1ee0d5d64d84a64be712c7636496d14060000000000000007000000000000000100000000f6ffffffffffffff8000305000000000008f0f00000c", 0x7b, 0x506000}, {&(0x7f0000012e00)="00000000000000000000000000000000000000008941f9988941f9988941f998", 0x20, 0x506fe0}, {0x0}, {&(0x7f0000013000)="b95ad41c00000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200905000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140400000000000000f7ffffffffffffff02000000000001000000000000010000000000000000fb0e0000a000000000010000000000000c0001000000000000ef0e00000c", 0x94, 0x509000}, {&(0x7f0000013100)="0000000000000000000000000000000000000000000000000000000002002e2e04000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000ed41000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005bbc645f00000000000000005bbc645f00000000000000005bbc645f00000000000000000000000000000000000000003e94c21700000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200a05000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140400000000000000090000000000000001000000000b4f7fb0d0124f97fb8a408dac5052e4f6930f000008", 0x13b, 0x509f40}, {&(0x7f0000013300)="000000000000000000000000000000000000000000000000050000000000000062", 0x21, 0x50afe0}, {&(0x7f0000013500)="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", 0x3e4, 0x50be40}, {&(0x7f0000013900)="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", 0x400, 0x9}, {&(0x7f0000000700)="f816d9c600000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200e05000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140600000000000000050000000000000011000000000201000000000000010000000000000000fb0e0000a000000002010000000000000c0101000000000000ec0e00000f00000002010000000000006c0000000000000000bd0a00002f04000003010000000000000100000000000000001d0a0000a000000003010000000000000c01010000000000000e0a00000f00000003010000000000006c0000000000000000d30900003b000000040100000000000001000000000000000033090000a000000004010000000000000c0001000000000000240900000f00000004010000000000001822a8f12600000000f50800002f000000040100000000000018d65ba13500000000c60800002f00000004010000000000006c0000000000000000a70800001f000000050100000000000001000000000000000007080000a000000005010000000000000c0001000000000000e90700001e00000005010000000000006c0000000000000000b407000035000000060100000000000001000000000000000014070000a000000006010000000000000c0001000000000000010700001300000006010000000000006c00000000000000008806000079", 0x20b, 0x50e000}, {&(0x7f0000014000)="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", 0x920, 0x50e6e0}, {&(0x7f0000015600)="af6d627700000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200005100000000000100000000000001e1ee0d5d64d84a64be712c7636496d140600000000000000040000000000000004000000000000000000000000f90100000000000000730f0000280000000100000000000000cc0000100000000000430f0000300000000100000000000000cc0000500000000000130f0000300000000100000000000000cc0000690000000000e30e000030", 0xc6, 0x510000}, {&(0x7f0000015700)="00000000000000000300000000000000000100000000000000006900000000000000190000000000e1ee0d5d64d84a64be712c7636496d140300000000000000000100000000000000005000000000000000190000000000e1ee0d5d64d84a64be712c7636496d140300000000000000000100000000000000001000000000000000400000000000e1ee0d5d64d84a64be712c7636496d14", 0x98, 0x510f40}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}, {@compress_force_algo={'compress-force', 0x3d, 'zlib'}}, {@flushoncommit}]}) syncfs(0xffffffffffffffff) [ 308.915285][T10581] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 308.928993][T10586] xt_CT: You must specify a L4 protocol and not use inversions on it [ 309.003578][T10587] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 13:26:12 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) [ 309.343644][T10591] loop3: detected capacity change from 0 to 20751 [ 309.634620][T10591] BTRFS info (device loop3): disabling disk space caching [ 309.643172][T10591] BTRFS info (device loop3): force zlib compression, level 3 [ 309.651090][T10591] BTRFS info (device loop3): turning on flush-on-commit [ 309.658535][T10591] BTRFS info (device loop3): has skinny extents [ 309.707824][T10600] xt_CT: You must specify a L4 protocol and not use inversions on it [ 309.787700][T10603] loop0: detected capacity change from 0 to 1024 [ 309.793840][T10602] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 309.835936][T10603] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 13:26:13 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 310.031513][T10591] BTRFS error (device loop3): device total_bytes should be at most 10624512 but found 16777216 [ 310.043169][T10591] BTRFS error (device loop3): failed to read chunk tree: -22 13:26:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) 13:26:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) [ 310.170401][T10591] BTRFS error (device loop3): open_ctree failed 13:26:13 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040), 0x1, 0x311880) recvmsg$kcm(r1, &(0x7f0000002640)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/67, 0x43}, {&(0x7f00000026c0)=""/133, 0x85}, {&(0x7f0000000280)=""/62, 0x3e}, {&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/7, 0x7}, {&(0x7f0000001300)=""/44, 0x2c}, {&(0x7f0000001340)=""/46, 0x2e}, {&(0x7f0000001380)=""/246, 0xf6}, {&(0x7f0000002680)=""/42, 0x2a}, {&(0x7f00000014c0)=""/4096, 0x1000}], 0xa, &(0x7f0000002540)=""/229, 0xe5}, 0x40) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8847}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000000)={'macvtap0\x00', {0x2, 0x0, @multicast1}}) [ 310.439960][T10626] xt_CT: You must specify a L4 protocol and not use inversions on it [ 310.537580][T10628] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 13:26:14 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) [ 310.740461][T10630] loop0: detected capacity change from 0 to 1024 [ 310.825704][T10630] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 310.911105][T10636] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 311.007098][T10640] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 311.018175][T10636] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 13:26:14 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 311.103899][T10638] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 13:26:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) [ 311.219495][T10638] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 13:26:15 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:15 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 311.510433][T10647] loop0: detected capacity change from 0 to 1024 [ 311.529726][T10647] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 13:26:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) [ 311.652327][T10652] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 13:26:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040), 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) 13:26:15 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:15 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x36c, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x198, 0x1e0, 0x52020000, {}, [@common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x3c8) [ 312.108343][T10659] loop0: detected capacity change from 0 to 1024 [ 312.185157][T10659] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 312.259781][T10663] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 13:26:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040), 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) 13:26:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:16 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x36c, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x198, 0x1e0, 0x52020000, {}, [@common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x3c8) 13:26:16 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 312.811730][T10673] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 312.855058][T10675] loop0: detected capacity change from 0 to 1024 [ 312.904825][T10675] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 13:26:16 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x36c, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x198, 0x1e0, 0x52020000, {}, [@common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x3c8) 13:26:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040), 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) 13:26:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:16 executing program 3: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 313.519448][T10686] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 313.582761][T10688] loop0: detected capacity change from 0 to 1024 [ 313.745000][T10688] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 13:26:17 executing program 1 (fault-call:1 fault-nth:0): r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:17 executing program 3: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:17 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) [ 314.004979][T10695] FAULT_INJECTION: forcing a failure. [ 314.004979][T10695] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 314.018666][T10695] CPU: 1 PID: 10695 Comm: syz-executor.1 Not tainted 5.12.0-rc6-syzkaller #0 [ 314.027597][T10695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.028385][T10695] Call Trace: [ 314.028385][T10695] dump_stack+0x24c/0x2e0 [ 314.028385][T10695] should_fail+0x8bd/0x9e0 [ 314.028385][T10695] should_fail_usercopy+0x39/0x40 [ 314.028385][T10695] _copy_from_user+0x63/0x300 [ 314.028385][T10695] ? kmsan_get_metadata+0x116/0x180 [ 314.028385][T10695] ipv6_setsockopt+0x510/0xaf30 [ 314.028385][T10695] ? __msan_instrument_asm_store+0x22/0x130 [ 314.072128][T10695] ? kmsan_get_metadata+0x116/0x180 [ 314.072128][T10695] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 314.072128][T10695] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 314.072128][T10695] ? aa_label_sk_perm+0x822/0x980 [ 314.072128][T10695] ? kmsan_get_metadata+0x116/0x180 [ 314.072128][T10695] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 314.072128][T10695] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 314.072128][T10695] ? __fsnotify_parent+0xfb4/0x1000 [ 314.072128][T10695] ? kmsan_get_metadata+0x116/0x180 [ 314.072128][T10695] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 314.072128][T10695] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 314.072128][T10695] ? aa_sk_perm+0x9a5/0xed0 [ 314.072128][T10695] udpv6_setsockopt+0x15b/0x220 [ 314.072128][T10695] ? udpv6_destroy_sock+0x330/0x330 [ 314.072128][T10695] sock_common_setsockopt+0x16c/0x1b0 [ 314.072128][T10695] __sys_setsockopt+0x94c/0xd80 [ 314.072128][T10695] ? sock_common_recvmsg+0x2a0/0x2a0 [ 314.072128][T10695] __se_sys_setsockopt+0xdd/0x100 [ 314.072128][T10695] __ia32_sys_setsockopt+0x62/0x80 [ 314.072128][T10695] __do_fast_syscall_32+0x127/0x180 [ 314.072128][T10695] do_fast_syscall_32+0x6a/0xc0 [ 314.072128][T10695] do_SYSENTER_32+0x73/0x90 [ 314.072128][T10695] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 314.072128][T10695] RIP: 0023:0xf7fa4549 [ 314.072128][T10695] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 314.072128][T10695] RSP: 002b:00000000f559e5fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 314.072128][T10695] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000029 [ 314.072128][T10695] RDX: 0000000000000040 RSI: 0000000020000640 RDI: 000000000000002d [ 314.072128][T10695] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 314.072128][T10695] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 314.072128][T10695] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 13:26:17 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) [ 314.966695][T10702] loop0: detected capacity change from 0 to 1024 [ 315.048845][T10702] EXT4-fs (loop0): invalid first ino: 0 13:26:18 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) 13:26:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:18 executing program 3: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:19 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x11, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 315.686115][T10715] loop0: detected capacity change from 0 to 1024 13:26:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0, @ANYBLOB="1400050000000000000000000000000000000001"], 0x40}}, 0x0) [ 315.748626][T10715] EXT4-fs (loop0): invalid first ino: 0 13:26:19 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:19 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x88, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, 0x0, 0x0) [ 316.294963][T10728] loop0: detected capacity change from 0 to 1024 [ 316.341705][T10728] EXT4-fs (loop0): invalid first ino: 0 13:26:20 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:20 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, 0x0, 0x0) 13:26:20 executing program 3: socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 317.021313][T10741] loop0: detected capacity change from 0 to 1024 [ 317.052823][T10741] EXT4-fs (loop0): Test dummy encryption mode enabled [ 317.061476][T10741] EXT4-fs (loop0): Test dummy encryption mode enabled [ 317.068644][T10741] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) 13:26:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, 0x0, 0x0) 13:26:20 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:21 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) [ 317.641632][T10755] loop0: detected capacity change from 0 to 1024 13:26:21 executing program 4: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001140)=[{{&(0x7f0000000000)=@phonet={0x23, 0x5}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000080)="5298b0e7ae836109f5617037cb194f3fc2634936b88fe73a83b2f48ce33d780451f5059dfed5bfe0d24b273d1634282412eaed87cf7840dc32e20e6fb00555d0459f450a32d4e0a28db856e2fe9269bb36f2f99db10a297667c605455d8d9ae21fec5bdd0019df4d9c22861e9d2ad0be7220525ff78a7cc2cef9e4052e5361602900abb2e434fe7fa3e99d936488c64a9845cb61ac138b67f557cb48954107233fa1d7ee95df0388b75ba1995b76700c6b12e29a225a37bbb9d941c45dd86eacc52f7f266dbe76fbf1bff43ba0f17b46c81e534ef839654a42c618e18ce448a87efdef0912", 0xe5}], 0x1, &(0x7f00000001c0)=[@mark={{0x10, 0x1, 0x24, 0x5}}, @mark={{0x10, 0x1, 0x24, 0x6}}, @txtime={{0x14, 0x1, 0x3d, 0x7f}}, @txtime={{0x14, 0x1, 0x3d, 0xffffffffffff2b8d}}, @txtime={{0x14, 0x1, 0x3d, 0x100000000}}], 0x5c}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000240)="d208d1cfaf4672a136bc82801876da3c22e5511a95c831a480d8bb8d6fe532fec8f3b88fd67c06823eb54544631109d5e8471db890416878ed9c3eb2c8d60e0561d521d845b130e8f85e2483ab3d0992a99320ded455cada78c714a2127d4f9af5273c5c271c3c4de34ed91b72006b3603189998ae3217b73b06c07c049c1e912291fa87955b63f51620d21e5161477a03b03d0322d3e1ec1ce99474a25f23b8", 0xa0}, {&(0x7f0000000300)}, {&(0x7f0000000340)="47702be2d5ebb871e005e9a0b536855b02a8f4b72f5183def2a6b1bc9b44b14fcc848b499e004ee42eb872978a9a2fbda460807c77dff308fc60f25173069001fa2be4acf649a412d32fdb9397176679ab43a8b77d4b038fcefe10b904f1a9ff13e1c329e7ea6930ff173fa5fe652a5a9930723a348ad71518992f9ff3d8633af0", 0x81}, {&(0x7f0000000400)="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", 0xfd}], 0x4, &(0x7f0000000540)=[@txtime={{0x14, 0x1, 0x3d, 0x1}}, @mark={{0x10, 0x1, 0x24, 0xb148}}, @timestamping={{0x10, 0x1, 0x25, 0x5}}, @txtime={{0x14, 0x1, 0x3d, 0x80000001}}, @txtime={{0x14, 0x1, 0x3d, 0x5}}, @timestamping={{0x10, 0x1, 0x25, 0x1}}, @txtime={{0x14, 0x1, 0x3d, 0x1}}], 0x80}}, {{&(0x7f00000005c0)=@llc={0x1a, 0xffff, 0x80, 0x3f, 0xfe, 0x62}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000640)="f9c3dd12894a94498a9ab738693bc4df4eef0159700dc53ea930aa7866fce5d7fc3e47905ece395240e1de8d5ef74fd1f0af0eb94dc6118edb2244d827c110c6c4417050d73769e2", 0x48}, {&(0x7f00000006c0)="8982b2326ccd737381bf336bbed3aeded8b858d66355c0fac37561ada1e403dbdca5e59140472e64d08f32773b411c0a8fa741834cc1676c44b45f1267fd958b2d04b6945c71ffc3a11a08def7f4b3147446291d4d3affb91519ee50c9d491c17ca4864e3fb8b46c0b9ce960c02d23b443ef25596e6b10ca6b80b0e80a2639070b50", 0x82}, {&(0x7f0000000780)="f014839176f5ab0113b7d48aa7c04871b8de5146606591c1c9a0d7407a9926f8bbc220c4390a3366d40cc6b0ffbb2b1856c0c47e11673fa420719b92104c0fffd659e2", 0x43}, {&(0x7f0000000800)="441b6e3903fb12493b4ac4", 0xb}], 0x4, &(0x7f0000000880)=[@mark={{0x10, 0x1, 0x24, 0xfff}}, @mark={{0x10, 0x1, 0x24, 0x8}}, @timestamping={{0x10, 0x1, 0x25, 0x7}}, @txtime={{0x14, 0x1, 0x3d, 0x8}}, @timestamping={{0x10, 0x1, 0x25, 0x2}}, @txtime={{0x14, 0x1, 0x3d, 0x80}}, @txtime={{0x14, 0x1, 0x3d, 0x3}}, @timestamping={{0x10, 0x1, 0x25, 0x13b}}], 0x8c}}, {{&(0x7f0000000940)=@ipx={0x4, 0x6, 0x0, "1e0f9800e024", 0xff}, 0x80, &(0x7f0000001080)=[{&(0x7f00000009c0)="1a6627a6c949ce4179dacd53529511f8e9814efc2fc52a4f6953d85a63b23fc3a4ae8759eec5ce49c95a11976895cf8788f3f43f44dea4b5b53245e902d9abdfe3f831c14bbe484e418fed12b02b4240c89bd19a2659f7daded9dda7721e7b8d0bf6a7827a28140cce91bed7297895b129a2d0b8b3dabb855509efc4aac44cdb518dda8ef4713379c0d2441b518b8098a7978c709d285d749c6b8cf64748d9c4df8215a886e8aa31965a175cf37f6f95a0fc4d550795764d9d1b8c06b6160b3b47f8e74de22fb07a0b2ccf030fe2757ca53291596bc263", 0xd7}, {&(0x7f0000000ac0)="8a967448942704e12a378bc63b09e83de64dfb27289cb5553d85b1bdc8d5552abb5dfb0bae5e7780a6c51ece3ad15d03ea072a9e8a1c67783461f80a2aadced7d11d2543441fb23647608b0be76e279015e82027f3af147ce6f03cda9f51d34c0c43043609430848265ffe178d838d6e8a1b4d579aa5a25959de6230c2232be7747e52f85aa71157ce48d668760169861b61f33386e8d2bf56baea77bd9f39d34852339a78585343aaaeafa78dd0fa9c330c12e4c405f16a7c2b57c902f4f66459935a0940eca34380ed30ca4c12b78b90", 0xd1}, {&(0x7f0000000bc0)="58a4306033feb2ac22b13de7fd49a0e493f22717f2f9571a4c4bd744dbd4776ef55d81a85d790fabcf88bb85c6f5fbcaa49640df3cc5bf40cf2aea6c8db6afcb0858a6154869dbac38d69cf98af54cd2810ad1a06181a120f7ccd06873f7a7bff1526e0889df9e6c4190a45042738de122f21f577514581ba7b345817f3003e6d0eeab377a003bf355c5434e43434ddfcbbfa205e5191e59f760d16b68c802615418db08284b6a25fc2a70afc02d67222eb4", 0xb2}, {&(0x7f0000000c80)="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", 0xff}, {&(0x7f0000000d80)="a4f7592e5bb7eacbf13e962d402bf72d53de3f13ce165f0a58", 0x19}, {&(0x7f0000000dc0)="70c0df09f66edf6f6a2a01a606e20aa77c4a551e200994d3068e6ee7f1462a4872a781061ad6eab18d5bd48d8063670057018ef7acc3432bf962c90219445b5f56beb40fbd290eb107f626368bc91223f192cc24e367f2c48b4ef2c1398ee9003fa57e4c61e39a3f88d31b6a5dc93bb167878e1cec371bf4b492", 0x7a}, {&(0x7f0000000e40)="68058fadbb80a43a2f6bf7265dc886562dc0480ebb707c74381bb62efdf66308af8f39f8174d83636345d9c331e69802107ce1a8cf6417ded8a2d28269501bfa999ea861767020a7e53f7f1286c7bf82efb5eb183f4ab2ff4e99378e20e812ec804d2276602cb7ceb2ffb6fe847022c5032ed422606cb35a349baa71cf45cbede45eeda2548313d50724c193ff1946db462edbf571fcd35fbbb22db3ad78e072c684108d9568af1680db003bcf90d03b0a223371bd11a70245479a72bac2f6bc34", 0xc1}, {&(0x7f0000000f40)}, {&(0x7f0000000f80)="69e9c03c66c0762df45e6dbcb453ccb5c69d7f50918609592db6606b3d351385e56a613c2e3c36f5e33ada31832d32d2a9a4e5d9c5bdb9d92f05c75edc2e712e3431bcff6abe51996bc9f07a6e5402a849651b012a2962a9c6bac8982bbce13835657c177555bf2bf9c54486089eeb5f2305b80ce248caabe149fbd817fbb9a73c6d33a2739aebcc7e46c76cf83b648ed4127ab6e2e785514f6acb72a9e892d091ce7f4d8d0c95a57b0e876b18df76442463995c252892231dff4e852a8e6fbc", 0xc0}, {&(0x7f0000001040)}], 0xa, &(0x7f0000001100)=[@txtime={{0x14, 0x1, 0x3d, 0x400}}], 0x14}}], 0x4, 0x14) recvmmsg(0xffffffffffffffff, &(0x7f0000003b80)=[{{&(0x7f00000011c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000001280)=[{&(0x7f0000001240)=""/24, 0x18}], 0x1, &(0x7f00000012c0)=""/4096, 0x1000}, 0x10000}, {{&(0x7f00000022c0)=@ipx, 0x80, &(0x7f0000002400)=[{&(0x7f0000002340)=""/163, 0xa3}], 0x1, &(0x7f0000002440)=""/182, 0xb6}, 0x2}, {{&(0x7f0000002500)=@alg, 0x80, &(0x7f0000003b40)=[{&(0x7f0000002580)=""/247, 0xf7}, {&(0x7f0000002680)=""/159, 0x9f}, {&(0x7f0000002740)=""/143, 0x8f}, {&(0x7f0000002800)=""/203, 0xcb}, {&(0x7f0000002900)=""/151, 0x97}, {&(0x7f00000029c0)=""/124, 0x7c}, {&(0x7f0000002a40)=""/194, 0xc2}, {&(0x7f0000002b40)=""/4096, 0x1000}], 0x8}, 0x7fffffff}], 0x3, 0x40000041, &(0x7f0000003c00)) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0186405, &(0x7f0000003d00)={0x9bf, 0x40, {0xffffffffffffffff}, {0x0}, 0x10001, 0x7fff}) mount$9p_tcp(&(0x7f0000003c40), &(0x7f0000003c80)='./file0\x00', &(0x7f0000003cc0), 0x3a08040, &(0x7f0000003d40)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@access_uid={'access', 0x3d, r0}}, {@access_user}, {@msize={'msize', 0x3d, 0x4}}, {@access_client}, {@aname={'aname', 0x3d, '#$@\t)}'}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@audit}, {@fsname={'fsname', 0x3d, '^'}}]}}) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) recvmmsg(r1, &(0x7f00000078c0)=[{{0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000003e00)=""/247, 0xf7}, {&(0x7f0000003f00)=""/166, 0xa6}, {&(0x7f0000003fc0)=""/61, 0x3d}], 0x3}, 0x3ff}, {{&(0x7f0000004040)=@l2tp={0x2, 0x0, @dev}, 0x80, &(0x7f0000004480)=[{&(0x7f00000040c0)=""/168, 0xa8}, {&(0x7f0000004180)=""/123, 0x7b}, {&(0x7f0000004200)=""/250, 0xfa}, {&(0x7f0000004300)=""/156, 0x9c}, {&(0x7f00000043c0)=""/148, 0x94}], 0x5, &(0x7f00000044c0)=""/105, 0x69}, 0x1000}, {{&(0x7f0000004540)=@vsock={0x28, 0x0, 0x0, @local}, 0x80, &(0x7f0000004800)=[{&(0x7f00000045c0)=""/1, 0x1}, {&(0x7f0000004600)=""/11, 0xb}, {&(0x7f0000004640)=""/193, 0xc1}, {&(0x7f0000004740)=""/190, 0xbe}], 0x4, &(0x7f0000004840)=""/4096, 0x1000}}, {{&(0x7f0000005840)=@x25, 0x80, &(0x7f0000006c00)=[{&(0x7f00000058c0)=""/4, 0x4}, {&(0x7f0000005900)=""/11, 0xb}, {&(0x7f0000005940)=""/195, 0xc3}, {&(0x7f0000005a40)=""/142, 0x8e}, {&(0x7f0000005b00)=""/4096, 0x1000}, {&(0x7f0000006b00)=""/114, 0x72}, {&(0x7f0000006b80)=""/120, 0x78}], 0x7, &(0x7f0000006c40)=""/214, 0xd6}, 0xffff}, {{&(0x7f0000006d40)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000007140)=[{&(0x7f0000006dc0)=""/106, 0x6a}, {&(0x7f0000006e40)=""/55, 0x37}, {&(0x7f0000006e80)=""/95, 0x5f}, {&(0x7f0000006f00)=""/65, 0x41}, {&(0x7f0000006f80)=""/234, 0xea}, {&(0x7f0000007080)=""/146, 0x92}], 0x6, &(0x7f0000007180)=""/45, 0x2d}, 0x5}, {{&(0x7f00000071c0)=@xdp, 0x80, &(0x7f0000007480)=[{&(0x7f0000007240)=""/8, 0x8}, {&(0x7f0000007280)=""/194, 0xc2}, {&(0x7f0000007380)=""/97, 0x61}, {&(0x7f0000007400)=""/75, 0x4b}], 0x4, &(0x7f00000074c0)=""/5, 0x5}, 0x8000}, {{0x0, 0x0, &(0x7f0000007880)=[{&(0x7f0000007500)=""/210, 0xd2}, {&(0x7f0000007600)=""/238, 0xee}, {&(0x7f0000007700)=""/198, 0xc6}, {&(0x7f0000007800)=""/99, 0x63}], 0x4}, 0x4079}], 0x7, 0x0, &(0x7f00000079c0)) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000007a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000007a40)=0x14, 0x80800) getsockopt$IP_SET_OP_GET_BYNAME(r2, 0x1, 0x53, &(0x7f0000007a80)={0x6, 0x7, 'syz2\x00'}, &(0x7f0000007ac0)=0x28) r3 = syz_mount_image$exfat(&(0x7f0000007b00), &(0x7f0000007b40)='./file0\x00', 0x5, 0x4, &(0x7f0000008dc0)=[{&(0x7f0000007b80)="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", 0x1000, 0x8}, {&(0x7f0000008b80)="881cbd609a648375336d71444266061f881e05b020ca8a2b51a05ae8050c43cff6aa6fde98f9b4a35c463ece80de529c23232d2d885efa4104ed7586bd45b0b0e094d683f614c3c0908424cabf6bb8bc44a384e13c99f8312bf5c29b22642fb2cd87e40cf91828786c5daaa762795cd3cc9b7a8339fefb433845f734c55b47d98a27dbe2657f6a1807674d18e22d1a328bdd6e0c41b18b7ed4c2b74a3e7ccc7b14bde0198df11c05dd7eec4d085a050c312240f39ac389cdf977d3627a014fb553a569337ba5f2bede16debcf2890295623fd7221d20f649f464bb4807d69ca1", 0xe0, 0x20}, {&(0x7f0000008c80)="2dd4f12b2945fc07c375f562f417783e7b085a78178e76e35472cf1f4af38c76e12767018fd31834797ab5af50f16589e9d89db38de177e9c86c6b726e28db4c63ff07ced56307cc034771036b591aab95d76e", 0x53, 0x3}, {&(0x7f0000008d00)="59b95c019194e5d2f1c162ca62840a4fb2d77ce428733c4cc2ae2bbd22d7974c4713d905a1dfe9b5609da9e498ce8371f7c2bbf21303330ebacb692f5e9cf3a21403c9954066aa0301d3d55938dc73b9daf00cecd0617bcdb94c7a70762a70678201c327e3ec2bfc6e7aed24cbf9b8f83754724e7d6c963c1325c5796e330c58265558fae48bf5aeb5636f8fcf198cade2f7833b94ae2ce9c563897bdd0a541df8aa2faba9f44eb223f25e607d65e9d246", 0xb1, 0x3ff}], 0x2043000, &(0x7f0000008e00)={[{@dmask={'dmask', 0x3d, 0x80}}, {@umask={'umask', 0x3d, 0x4}}, {@allow_utime={'allow_utime', 0x3d, 0x7}}, {@fmask={'fmask', 0x3d, 0x5}}], [{@obj_role={'obj_role', 0x3d, 'aname'}}, {@seclabel}, {@euid_eq={'euid', 0x3d, r0}}, {@dont_measure}, {@smackfsroot={'smackfsroot', 0x3d, '#$@\t)}'}}]}) renameat2(r3, &(0x7f0000008f00)='./file0\x00', 0xffffffffffffffff, &(0x7f0000008f40)='./file0/file0\x00', 0x7) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000008f80)={0x0, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e24, @loopback}, 0x1a0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x9, 0xff, 0x1}) r4 = syz_mount_image$f2fs(&(0x7f0000009000), &(0x7f0000009040)='./file0/file0\x00', 0xffffff7f, 0x2, &(0x7f000000a100)=[{&(0x7f0000009080)="9c42fcfb45cbf27ebb06ba78615ea935ad7f6bac99f09fbfda753b45035f38caef7bbd906adadb066ca4d6e4cf0fcf94f4f897123487380166fbe64dbf281fac15eb11cd7f8db5fe646e4bd13e281e2edb6190476424554f0f4d32bf6d166dcad2", 0x61, 0x4}, {&(0x7f0000009100)="e2a486834c6c41b22c86339269277e9b1bc6bf98dd379b33b15f4c85686ac1cc0a77ccf8f7193b08c07b026f82341d0b2d330eac49badb3a7950ba4242a08fd0e844de8aae65754a910be431b0f9ee88fa9d803224da87748f9f7f00cef22312e60a451d65cd2cd3dd40b9a248f4b7e1260f4d66f5667d219bd43c8d0f64c8b7426e75c4d587ad4390edeee8d10809bce0353aacc1935ab99102dd2e84fc496be4248db0d060204e32fdbec9b4914663f5e67722fa6322d1189aab671a13ddc38ad32d347d57d286475c11faa390a05575a0b02f0a2467c97980ed45c897f6c8d180889330b7ac5a41c317fa92e31630db6ec369c9e958cad7d0b0426a5683b5cd753704061b010a0a76b4880893d17a988680fb8f569240d16b5740ca1cd826dbff526c12978ea82da022e7b16439cdd80593d8f62faba7344c961fee35a2ebbcb2b3b631b8941fc42bf1ff20e0862c93f59ae8d7491abd021b1a9398bd9dd1f31fab998463ff70dfeda0e733c7e46665644cb0077c281eeb73253a3272aa022867ec95d308048278dd0f0e477c44409285abd7cec6fd0d91ea2ff0766a26100f61005bd734916553bfde0ef0cb81cfa6b1d78461bf14edcc88830456d8957e190e94cac7165d1623f1497386edbc7eb5ddb1f326cdd4bc4121734f9a3013389b7f4e40c12f7503fca30316b9d9423fe2c875f7a69219489c3dbf5cc68461d23796e724c7731e054a437c49330a155d2a08ba3a633ee5f185c8071f62e39a3e1f6e6b4f0a5eeb8738687e8cc7021d3e22c14d11953143a4933e6da17567629d3b24d6d201155d8608c593fa434484b238ee7221cd9e8366b77bb2837028c468d11a79e75418fc464335ae84bb1758b998b3b888d11f96b0cf2b730952f593efde325d43c94384e899ede3a76e4f7dd7353614364faf427dd3332051aed74d2d84700f5a3c43118f18761ce0e964f320ad909424365ea92105d2c0ac0113de67daebce3d518d92f12d852bccf90dbabc8d66758a304538f9eb5f7e59d74ea5ffec2ba2877ad41065aa2f094458a4edf36ed52c10d31ce90605d9d288130344266470794657c7e04c455a0674ed0ce856b8afb8e188e94437a0f6aa975c11cea031583c379135c52c4d96c2abb002380fdfcf9e76747227640725ae4624becbefbeaa557dc8418b8568aa3800848b983e0cfe8da0bb59e03556b908fe51c7f951276ff2793ccea88edd6b03ba1641a35cee5116083ee759ceb29b7678a0943e34b9ea20ca2060c7c351f113256d8bc26cf4710b547275eab9342f0cd2dc103b3a8ae9ec45efe4ce06a9c43340323404e0231f58e6a4570014aa3209b59d8736e7405929188735cf880ea6baf373e67a43cb269bd6b97aab7d6552bf5d3ea310e2247afb499234c7b1d7fa6ec6d61c8f37849802704e77e1a24fda207faf7eb4fc556e31034565813cc6e3e8c25494d3ebd83cf4da056bb4acd4c95f5c4c838a01654d7980f8e5006828ea693085198f847ee34b630566f2064ec0e65ddbc33bd48f2d105fa5e97624080a3c681f66fdaeb734a2fc0fe28a28c22707ff85e55ecfd4f3235514da5f2a78d3023b096625245ae2aa56b722bf2e56e58b669eb080c2cb59a12166296e923631273d7bbed260f606fcb5fc64045b02be93888ccf29fe90cb440c69d0fcf37ec82a501661c37428fd0abae4724b86825c47a369f69cd5fb9c06acffa09d434959b7c5ccf640ce9af8e2fa381ee69eb382af0ce907d55876286a65193e63446b48fa2dadbc7a451938b04bf8d5b29ae4f74c1c9d234914a794f23fb36007f9186cba09e4a39f628de9926762ee86870f8690ead632fbadd6a6794568985ce132ff95586a07401867dad7a9c530dfecc8a744407f2a197baf206ac53715cb9c3657053e01c9b7aaa9bc3ee37b8ff07bfeda934f6b648d611e307bf9c3f02ecf82c99cf50b6d3c177e8dd5ab3e59120020236b5f4cd707567d971a3b8c7d4f0dc519903c69d6c05f9269cf15938e8d75b8e5774bfc46ad910b4b84c5f787e96d053bbe1714250e36fd1e6cff65490653ac86c77b1710b2eae41b7647898c0128f285175de40c538b2711a44494586e50dfc0d158590a2af9b8bac3025a00e23790c7a81c98ac73caca817cdddb04f79774771ad73ee8f6042f057e9f2fc7dc5b5f17387e51a2046c33007a9696b474b22c222258901a8adfbbb6021a9d3276952dc97a04d05176c7d4727d32c01416c234f25cd3fb7ae9649263236add8de1b6e6366d1b5c0e619d14b290b93d18b81b7656d7b4bdb5c60c19dac08348fdccb75fe69de7e43e4f669d130b8064779d0299e226e878966ea164f70ecd913fc23aea8954f078db5c863ac9fa1fa27e839dcdab766cffa4aa4f8ca2c975ff09b39580f44d97b2f9f565c6ad4793a781b0ab950c3a43fd72f4e329207380d9c5747e26afc1d0e13c350dcd8e712e6a49bb570d7decb50d64cf1ee5c8320b6e02eba58106fe4c172c6b2000b570bf665f5be5f6244f35ecc1aa04950e8de6add7f876609ec73138015c1f0139c062127a4d5eb8a6bba175ed77ff083aad7a3634f8bd0be3e7ee4fd1e925d89db13a3983d02a18dcd6630ca6aaecf03ed896702359810a2e20099075c0029d42ae1c3f9027c6ad33530b3fa622093106f244194411d088315fbc575c1753f5ac422271cf85db3df0d17419e0eb260d16597319c159cf022e3a90f0b9aed67c3ca0d3fe702b8ae22fcad31a91570ca6a58f31356d1ab9f4d2e97735b64f540bca864504f085b1701344b9fb405b149641a70b84d5513375310146b13a8a7270ffccb2daebc594a2920e0ea8e992b3a5e7cafdabb95680709eb9558ccdc46188b4dec69afb77a38af952fa93c5bd776c847a674750cc6120b53c645afaf8a822010df330b42aa5fc2719de41ebec413a778149ef13a33fe4cf049faec8799e11ad7f41d3a485d77edc3c41f97acba2df9ca00c3b1bbb61f1c0f96f0f8070746e6c1bb39b68bbcdf825055ff28679ef081be2dee31bec86dee5b2a4ad43125609ac9d89f88df73df3aa89f0d6e23cd30af8c7df54e864b2a5b7f5a1c690a7c0988a4919872f838ec25f01350bda1e4039a0a67e60e02612c14f4a27e27c2f6bbf375ecd4aed89910fcc87a62dfbc2682fcb4ecf42d1a7e4980dfa29f74ba6f827a1c20c8221d8ea159b1a7adc1fdcef6a7ecc5df19c26b01ef68287e9046fcd7c9f066c7b2e56242be60ab9f9371d5004512addd04d90f798d89005f3892a8324b31821e8f7fc616d5af93ad64edd21c99682e7b9a4325154bef7fb1a77f8bacfaca5eb92aa6ab1bdd08511047de65e6744b9ed43be4a07de7c29546d649acc574f5c076b9700b28641f5e530ba850582fc53c98b93de1b6cbf563e604fa67a29c97df4583079a42d9987279225431b91b626d3bef04b0221da98d8c1c0071570bb32006325127c8e7c1a0147707c97fe7121ba3ce0b08ebde26992aaccddbb83e7bce50f88a6d446145b8acd04856171b17c77125bbe11c26f88df02444fb81471eec09ec7ace4d469821409e372b30f8014dbcddcf1da184f2c0a348bf5582b0b52cbcd1d2608e0e8c99d19411016720cd13cda96e84bf6155e4070498b291b8b962fcd55ff000bdc918c454f9dc0c5cbbf9df6392b71936fa1aa7461c14e2195485cd37f39d4e362cda0e4ad2a9ea199a950a4e82adb4f772511dfc8df6e13450a54e9bb61d4003076bd192adb0751d1b7a45738f82167c2a550e02962a80790ef837db538db43859e98294d90e1f2ab126d08fc705d74313935ef0bc355c910f8f97843c7c9df5e1b92528d62e7b111c86e1b1e87043c87eb2a82b7e4ea041a24bc22f7aea8b4c3415b1924bbe6d765c59f01fb0f84baf8b808cde05b8f0d0f3b74040999b1bb4c5f5fc13f1859b0db5043a8027a529cc90b48a4b0a40b3d58999c0a516ab4391a8437e452cc2ef8d28ab3abf430e7582b0fac1949acd04ed0da1b296328f8177ebb8b3c33b1baf56a5ad900753a980e050589d8ec48c46287d741bfcf23400cade97ec950502bcdeef33af8fa3057cb66eab6a4537aa73da806257ffb0c56c25a301f48fd19e4bf3e22dba179b3f9ad90366a4644ae00bb69f3a09c539a657c61fc7b9ebe4a2c3e8a77a927b0078c993b81b90f22085f8d9896a41773ad2d2ef9433eb2d6692a9982fe3cb7c24ba64508b288f6ed59b9370e1834051cd00d45326d1ce507bd67e657e4af4f00131a680b01a2aabf9fe4af555a1ed07ba03d1e411f4a2e11fbec4634e2fa65500cba8c5424211fc9548915e3dbb369bb7f08ceb7cb52b82148a27c5e13d67dbae02896a2ac2f03c20e5016b4b7993b52c976fcb3b5ddb09eaa1e82ca48ec77e774ea68a05dbed08bebc62ce42af9a1ad5a0f0190190f6d4a9f57457662a51eb0a93c8f38b71d09bfa97b371fb9c1571f031040940303f8b56aedb30fe4e0bc6847036b209aa168d426356f566df030a17abed63f1d7bb9e30573cc7a07e9d9c7c42dd51d0b70dd600d6bc186e64b286085ebef66db65663ac0a9f937e83b8d424efda4530b230692457d6fa3d6e7f819974bd7bbc5cbb3d2f5aa8aeeb26f6dfd3d38cfea824d4548afc5f7d6da626587db56a006a32af03ba09190c2c2621a41d9146e57770f55f266c5fd3e2d5b3e2d19eb18a7e677af81b0069ade51f7d2f1bfbb90b9e14d0a9d0c4dbda11b35ce2b6394ebd8fec553bfa8e5b5dc54b9954bd7846eb4bc83bd0c2db82dbd3f4df610993036c8001ffde8e49ca27c28d3fb1bfff6d90cd9bec01155ddb0df136cf78965e35613709c70d5eea14dc1d365b687075b3b50401d4ca585b8bd8e2b0e43e4605f8227abd6d41a8e1ca0c92f6d656a3988c4dcc9f56701a867faa3bcc6b9fd07d1dabf9bd5c12d8cda59b5c1df4558b85051d91d7fb9e1e1fe52ff5d68379a991057d5725320207605bb927f7861ab1245dc0d250c0f62d2b0147d8e4fc30763b999cc66210c9074ee4f6f8002126d14759221bfb34df89a2e292666dad5c86e070eb29529e6bf1c0047fc7ae51e89d35ef4cb30dd65083be715b2125714a3fe04eefed5c654c704f3a4a1506a36e146cc9fec7ba985f2a4573b10fb25343588f5c68effeb94b9f974ec10b7a49d02cb25845bea1fe85271fa7f7e30918f7a24cdada45f91df08b4d13cc3b59027d7b1fc850342745e7e260556055a0fb77ffd030ff02df1bcf7c30782057ba3f6b8cfc8ffdfe57b61c0e0bb00cac3d01bc07a3b19deeb373f0759eede5d49da77623a960a92dda4956aa9c3fa137618ff4869f8e555dd163523ce950e37df1ad07e9d0430f276db274756e55b2883af1adc6ae984f988dfef14d59f2a1b676816883538d7a53c438219fb367436baa863985803dc6d8726ed0da294651262f41d24c5135a19d69cbb2b3d8ca41ee472feb6d4aa1aba96e4af5ab3c6d5c8227f5552dbceee714c1a0e048dfbc97f04b6f11238e6d243176ce425843419fd7316660d4af74d3d9d55ddfb7ef6b21a6cf5d1b6eee4cd6ad399a198590cd8d17603824f36b4878ef2692eeb55727257f983bb8b6b9cd484c896330764dbe2aabef05a8e036cb8cc74eafeeaaff1c5c15271b38fe80591ffffe364465c8238289ebeec1ab65348f29cab4894e40acdf1c94063dc4590aa7a2f4d7a830cf685cd782ca006a4a44826732abbbadb8c23394622fe31dd1f2bdcc84af5b664f6af8b96e81a53652fc54eeef0e1987cd043e6e121661e5910f7727afe700ef455", 0x1000, 0x7f}], 0x420, &(0x7f000000a140)={[{@inline_xattr_size={'inline_xattr_size', 0x3d, 0x6}}, {@noacl}, {@six_active_logs}, {@noheap}, {@noinline_xattr}, {@whint_mode_user}, {@disable_roll_forward}, {@four_active_logs}, {@noflush_merge}], [{@smackfshat={'smackfshat', 0x3d, 'access=client'}}]}) r5 = openat$full(0xffffff9c, &(0x7f000000a200), 0x381e01, 0x0) signalfd4(r5, &(0x7f000000a240)={[0x3f, 0x7]}, 0x8, 0x80800) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f000000a300)={'ip6gre0\x00', &(0x7f000000a280)=@ethtool_eeprom={0x43, 0x7, 0x800, 0x46, "3133defa14c3c12f6502570b89502d4d88d75f9fecddcff325e384cafab7b709a3f75e9c027c66f0747eb46c617b1fe735d641dc0168ba2e3910e863f7a7847cb4fd6621cd82"}}) clock_gettime(0x0, &(0x7f000000b800)={0x0, 0x0}) recvmmsg(r2, &(0x7f000000b7c0)=[{{&(0x7f000000a340)=@caif=@dbg, 0x80, &(0x7f000000a3c0), 0x0, &(0x7f000000a400)=""/180, 0xb4}, 0x81}, {{&(0x7f000000a4c0)=@l2tp={0x2, 0x0, @initdev}, 0x80, &(0x7f000000b6c0)=[{&(0x7f000000a540)=""/4096, 0x1000}, {&(0x7f000000b540)=""/17, 0x11}, {&(0x7f000000b580)=""/10, 0xa}, {&(0x7f000000b5c0)=""/100, 0x64}, {&(0x7f000000b640)=""/92, 0x5c}], 0x5, &(0x7f000000b700)=""/142, 0x8e}, 0x4}], 0x2, 0x10120, &(0x7f000000b840)={r6, r7+10000000}) r8 = accept4$nfc_llcp(r4, 0x0, &(0x7f000000b880), 0x80800) sendmmsg(r8, &(0x7f000000e180)=[{{&(0x7f000000b8c0)=@phonet={0x23, 0x5, 0x2, 0x6}, 0x80, &(0x7f000000ba40)=[{&(0x7f000000b940)="accc2e6dbcf1e31ad7981572a6b9671426f2e5af7c0964388fb9e4720713bac1be75f56da3e87071807f23ae5287a0e4d7a0fe40534f309c46e2f79255a25636e06a7edd814f4296fe78634bbf2fa87a187ab3419ee8294ea0bc12730c0c789c5ff336006fdbd107980d940421ee10b66e7238a7636381d73414c0808ee219ae776b3d7d70c570f2e911b3670a6fd878c7063d7c84b2ad505c8322952f7c6b0ebbd037beaf09c2810960161ad171871fe51190ccc3d38bdcfef4bc716659a98d603148cc5fe7d671a95ccec3dc44534bf7cd2535c9315fdfd2229293761057bce18eee", 0xe3}], 0x1, &(0x7f000000ba80)=[{0xa4, 0x113, 0x95, "dc7df64ce641d7a99f4ba309c617b88bed0587b8c0cf9931014e37ec641cc5cd334cc7cce95695d6092366fca49d2a26f4009827e65f25cfc1b47efca67d3c5803aba1c0d03dde783c55df4ba6c47c1dbf0f3c04077063ec28799d1de7ba4ec6f137e9f7ea98295723e63d9c9af2fc2f9db9ca68f0bc44052191c7ba67f975a8d20a15c786b36e1b228f01e7e13eb6f9f1ddbd4512"}, {0xcc, 0x109, 0x1, "d19578cd473042e64604849c3af66c3fd38f3bfd7ea90bfaf4ce6948ddaef51a4279047a3812030d786d730485d5850f802f3507fce62a93b2435a12478e6b59b5c3df7ef62510cc29fe12d6cde8e53a0d95c44cce60ed331cd90d3799113a8c26a2a4d10ca3074b9f9df52730af70aa78d34cf89902b375bd08ca39736a34829306c57154c8293bd59219f0dd1e50d3002b6ebe6da53f23f6556606eb40705e136727a270483399189828195b8970306606cf2fe772b74f6c6b6c49972d"}, {0xe0, 0x11, 0x101, "0093877c33ad28cd11c2303ec9c99fa4b0c0e5e1df1ac22ea17f75297728a4827c256e6a1575f28539063391ca7416a1ccb8deb43a452dede2586116ff0c405734816f56df930e142c7745ab7b0215ee7e9c16ee380a28fddddcba901d18066d6bc93c13af65f614819c87cd1725fb8923e276bd7ce9720207691bbc67b975ccf1d17e840cdb1e25b5c98fa98d1a3c0276d9dd0b656aecbbe521cff1f51daf87e7c808d0d0ea96e923ae3123bdd8bc27bcdb38c07b337d04b04bec56731ace66952a6abb37936a6a776fcd238b068029dd11"}], 0x250}}, {{&(0x7f000000bd00)=@phonet={0x23, 0xff, 0x55, 0x8}, 0x80, &(0x7f000000bec0)=[{&(0x7f000000bd80)="2572fca1eb9aae3706667c4d47a6d886be5a58338224d48533c701ca8c49799267df31ffefc660bbc8fa7a1223a6983a6230c64442dbe7d9e27841a9", 0x3c}, {&(0x7f000000bdc0)="37ddf5244bffb87d7216b736c3c3177f6fe7aabfbc6548d69dc3764a355e45458a8f9c2a27128247608dc88af9ac55ce6892b99eb0e17bcbb4a7027319ba22e1dc21e5d36d66e0710e1ec52c7cc8f0", 0x4f}, {&(0x7f000000be40)="180dddc7dadb689b392f858126d6d25a68b616d1c9d39043dd7197f3fdf9d290d41fc09eb1d0494a39f928b963cbdbebe9ec19d0c576fdeb13649a645cc035303646302b42b0bed0fb63b30bac3117e9265e2979ddb9d514ec564ae9", 0x5c}], 0x3, &(0x7f000000bf00)=[{0x100c, 0x104, 0x1, "afc9abd9a1ce32558e4186ab5ace6683011240693f8f88c50ff2c81c491ee17f39c845e1a88cfb7b62236df58f0807c7cdc73be111a2cd3c714bf0cce4b18ec826e9d0904cd75d58852c4a2d1c5738f5df694cff0f82d0f68d4c645a41eea27cbd05f3ab8a36be53152c05fd7616e6ce34fa7dee5eedcf2a6f2abb9afe7b0eb6959cbbdc949832325e4f70c65daace6a3114982f4b5904c6674f93d54b8784114b6583fb82821e72bad996a68e15aec82611dde33cd5df9abfea97401fb22452f19e0e39a975d4a6c29e5cb59f09547337d60473f3e8f3f15758e20cd92662e127e536ec29d85a2cc06a12a2002da742fd6a1c266999d05ef24ffbf862c5b133120c13781723f92bb67b6cddb65f0e2b1d95ea7bca97ebe2dc75098e7b2ab8fc6d24c0728cfd6845eccccd01ddc4525f83ea1332371ca7cae2f84ed7b1c69c7231453609049ca94e654f5caed038cc9328312ab090858d91a69774de0778b5a5653c05d33c34f5cd9779e7139248551eca04accb31489117879751da82a9dde799c043f681c6cc01295ef11b55c67588c8b8435316f6c8f976a02b57a03f221014c0dae767294e291267081047613ebad50f7d026a692cdd2f20226c44528bf8fd8557226ecc7209c2d16cdfa1ad7bae4b9df3dda13b2e7356a4192869470bc78cf1f8e54f15cdc65fbe39541af7eb8f5defd5ef9686f167098844ed0b9b66d6c77f90f3f9c3018775c318ce88a5a223ca05090c4ba8f718eb552c3c2701980753d6f9b556b581d8fcac3b808c663e1c97d18180a7bd33ae75180f7ebfadc0b5128e964549214205f45bd507adc6b3f3bc1ab3cce8f351ade065fa56530e9a7c5cd40acb7ec3da1cd22c42cead6efcb6b7a6a54463c4fa05c06095313173c88fe710e655582dc3f43bf48de0e38a70abaed4a155994e033e4c1a2bd5cde38e9c7199498f2b744f4e25c1cd47aed835027960bfe96a3720dc7676c249ffeadefbc0c8ba073829bd4209351e99822a20bff27a74b6103ef6e1347d6b6a5aaf63104b067a8775d46e8dc3c76b76d338b13ddb2521443f54dc3516f29384db9f0936f5e1eb5771b4f9ac419f2ed202b9648de8a563ccc8d85ec0720c043881acf794c1d93eb3821f4ebab7480acc467b74cfde574aec9e49a7d831deb914a6ef486602cebdab5902e9f41987ba0fab67efbe1f2fb5ffde1a7f3455ef5338cd5ff9c5ffcf93cbf0e11f08284d43b1b56139b711474fd4626aa6b792dcbbbef9656a69db77183241cb09e7d18e6172f683d24b79fb421d71fff8a5ec89cc3fa780fca2f1e5dea6f2429d698da8c8fb0e9977b7cd9b49da14b805f5e69a9fd5c0647d9a3e7e34fb1e5f05b7555e8954925409a8006c94eb4fca4044da5a10a0436012b9803671f57cdc3f203f2599c030d0382cc98e5a917e3ecde42def1e0bb5f648c6feb50c886e8d7dee9c1e03dbe61959de4572e355c09e9229cd630c73248eb161123fc8d2983ae22092deeca5e5fc5b4332b5b6e0eeb193a55ed0717313524200c1d73d9a026b1007966a32d40b927ea655d7bd53314a69f37c5e74c6aa123db73eaf22afc2dfa1f4f86dbddcdd7082c4cb09dcdf74e7fa0b5d558a6ab24e698d8e0afda68ae343a264cd5d47253882013b5cf8c0ef757a7effe00c201fb739e5da0f418c3eb405ec01c2917a055a73b9bda4b1c69944f07ece88fe1c09a815d48bd767c89defd5d82228694d43bd1a3541e4c397c01964c517ea8fbbc75ae3f0b9e7c2ec1913be7c39683bf32ab40cc08e228c0b44801b8c3a6bfb66a4bf6ca9c5131d8506cd8cf3a5fb36cde3eaf8c126bd9f77c08e69f4655e6803c5c4151aa7007a1c7e7de19b5febfd8f9e454ea4dc87f5d8108f1c169dfd494754490da64aac3c2bb55c3e566cc94744abc58f1d25e21b7ceedfa026fa2aef0d7315c87487412f2f082bf7ab93ab30767f0ea0265da17cea8820a01301fca53f88d504449d0abc5ffec3a1b1536721d0e6261e48e5d9f79bf032bc74801de104366d9e84cff90752c2d9699406baf0b7880f755814900e20a6bee85adb55fa5fd9ff2073895170a1a8b94c18cb1239b47e4360261bdbacca3344a667b5dee763b2ae26f6ad5a160463c9003653795d863f9aa65cecfc0434ec11b9aa0605a7e2732756fda66cc87f4de1e9a834036609ff1b7739450fed323e0cc3728e45d0f731618537405ab9bed6c545bf52efb2fa57cf6d16863bebcae6bfc2bbf66f8b40f0b0fecedb4e7c72b550b05c3b36be7a188d75d734a43ebb6a82416c458ad4fd3af38b8dd3326b8a0a6ccd3d44fe05d527cdf40ee66b96f0cd9a54c40f9f1e55053170b265267415256a4132f2eea18b3be41936f953ebab1092680081c5da35222827df1f2373fa07003952dfb3f1ed96b513f35c8d4c399d2ccce5f27a809bc9c5c7b408363fd10048b3e1c89831d8cf5cc4eb7c6530e489a2c4a96e557cec02e7d0ef31188236ad77e60a3412250c9b35b06252a61a067ade4800175f997d3d787f816b2d8843e8f1fdbb6c977fad3ce6e014a1583362c33d5fb731331f70b215f00311acd88b2113e4e69bf89214b44c97c61b03f279d73b8b5da9e1aa7a553bc026fd492705dda43bfb233262b6f4fc718df06859c0f2d0dcebc7379d633a85363bea522a4488f676e7677c58b8e833b5b24b73a92b187460339bad01cb9a3de79b0e6087156eaf36b4af0c2fbc9b53d64d395bff85a44180de303b35f6d4498a63e3367fa0084fe9d5cac90986fbb2464dc13aa062d9a827347ccec164025f299a348cbc556494d8609123f100a969ec25558421c7f2a05bb5dd6dd7baadd3a061f639c52fa72b531810902662132030b6c829b4726869eb672715165c7939ba7f5b5af8dddfe3724ebb0717228cb2d193117a4d2f02d14bd81067f659ac5d5a6a6512fadb1b0f562aca6be89eb4133c0bdebd760ccfc87a9ac4825b45c2db42442132085642d871ded60767ea14fc97ac22027d1416974f4100cb14d5dd4bf917fab9e7a6a1db7911ef2d409d7eb1bf7c4bd88569504b69052c3874891a6d6bf60c043180f15e33b3224ea8599b07546dd6fa2a6ed5306a2c233b4c1f6c9a21b19bb6ceb4d5559dbc15eeb64e834920bf0721f1e92349bb2f609fc6447a8640197f2cc4aacfa7e56c3282a3e932f66d1006cb7c8aefb958e7ffaf78f6311a1c514bca99473233d34da37ff9139fc70a9ab5e1e5d5c1102cd5ddebc5488b3a004fd93b23bb72a2bcca1a1902ad128c2d160da793960aacc964c93ca2e1e85466d9ca514b4e77b5b21471423fc5b57148d7cf96f7837ddfb8c5804657ea8585026d2461f32483b5d2afade98ef77b723d95eb3c3882348bd9883e7084a463947d03daab4665051452bcd9807851bcbe5f9b6f2d1baae40193ab450f9ef3b26eb4d0292363a67c353204fdbf4c29d5b13487faff7d09bb7cbcdd94cdc8fe945b2e52b7feff0813112c8e5e85f1411bde27121af476c185b24064f3b252f0d3ba850a1232667ae09a3023acb857ae7830388b8d2958dd1e30db8119344e3e2719927b718de1ea39256d08f32e6c1349076756ad4a4f3e89b3120389d975cd5c292aedd03582ed25abe5f69ee671c0fbd187c189799efc639ad63999dc7e050c3b2762a3c9fcf82ae20c5b87ba3c4c4bd479bc5dec193deed36a908249fded9956d33f1095c59fafd1f8c955a7a96a0bb53bcb96d8d35c8e6f1dfac4c446083035f299efe4191866a6d9948f5692115734288f7e28db483651ec6223d0d925ae1628c5ad690937b93b2c5d162dad5206ee7a938d9f2f336ff7d0f68759040f0518f655b90255c0e22d5b92e4fcb8ddfa2b0751543412169f63532c59735bcf8c14f521cc019b189dfec43092344fd1a29236d0e3979bb7c64a9f5d5b2041721be326458fbfaa4a3b52e3fdcfc18de9457b8768769cfcb61ba4529043404ed9ad6bb9020c7cff2493277027f24027f9177ce9320fc11fa537e1da4595642bec473beb07ee4e236da4490609bb3dc5b0fc794c2d2e1f53ecb182c90b0a00b16d666825c586f7334b71c2200e0f7b5c9cb4a3f08820f56b87afdba6d5b41bf034a50c051407ba9446ff4a393714c77158955e4cff41827a24c4300ba3d031377a66be0ef2e0ca7652fde8655ea563968f96f7eef85ba5ec87177200ada46e1833d7085c9ff481c4b3e841a67de016507f8243aee192f285894bbbb59a0369a11b71782fe1fd9a99182af11f2dadd2c4188eebb0644fe8ac7f1931a9093f3027023f57635ff4463e18ecf84f9c1ca84a1723506a20450dc865c7f72f77cb98bf214474cd3e6775a410c74732b116348169b7d57ed3f6833d84d7d48c63da4530fbb39c87fb64763bff3f680487fded12a31c80c77830472b429d7fca203d0a7becc98ef5bdbb0f0a8c111f8abd3a7714fb75cebfd30fd636bcff83c6aae78548b9c6df91c0bea2e3903395d144bc26dbeb062dce8f8da5b7f8e0d584d31492cc7e94bcc1efc83e7aa406d08b935d0d7e834edf7b6cdffa0865266879e7a7a25130e56936fe8e21449b580f3b55544ed924e912d3f377c7de5322053c6b42261e81b474dc9dc5ab0aec30245045f0967bf9509907ad0ad8e3d06a175443fd86f7722fb7b15ecd581f66bb458fc037ec822df1baeaf0ff2379ad10bdeed6f521b74f3019a623239acdab93228a13748376ba4d4cc62272798c44731b748c2471040e7eacf64ad4919bda839b051e982a16d38dea6c6b93002d014adec560a73f5f2e8642c65737db916794817d9ae2caf3c16750f76b59b8c5263063afcefe8850c2672ed0cc4f0ffacae46faab9ea0f7f5f36af11a082dd481a710dda67a9e7122326f134bdddb1135b41e7de3f10d942c8f7e0eaef0f1b2a2c27d0dc96940f7be4eb74a502631245792746768963043f05d3d6f256f4f9a9f377fee4f07044837e30ee26dbad0c0edd9d5c3d5032b37fb3df01741d203fcfce1c3cc721772711e1b85e8ce778802be1b9d075f9a794168e691db00d03bae037d8bbf2332f4f205a364d59df72c4d762efb73aceec45a03992defa3816a924186648bc8e7d159ee8327c2ec3bc0c92b6369348225fe88a92fa2e1145328111b50b2ca4444fc02c552af04a60b2d1181af9997be208f257837ff1630b640041585fc4f84832a2eb3836358f5ee1fec88d6e6314c60280f20797e502c74f8d93d29e70d385fe1b0a32fcbeab7617bedd87827695d855bc8b2ea4ee6a650409f4b1db0b071c4a8cc50c56ed9ea6fe19a83b4bb28e170da90bf0b3aa48b5d899cf44fcedf15e0fabbd05e46597b0f9d889dc884843a1174c2f89abfe7db4806504eeb2212f51e2fe311370a1f03c5b9be4d69fa8d0252ef5ab60c133ca6be280e5514932b71d9cf8c4fcf79f1c3e2e47563846141046820874096c0a41d1a75017f9682b227cf50bc755ae6e7bc0e42096553db78ead25f80fef81392a389c9fdcfcce8bd646a9565bb94aab8cdf9e52e7ccfa9aeddc31d2ed1d1015e149842c7f29d7e86f7003c041879c261487a631abd47be9d86dcba85c3984fc5701d86d433ba9e3f03938078e70b48e30d759eb67166da48e6baf14ef981c69293f7644c0276647d63d17b5eb12716a45a1409671883258a5e9e63e4d2d5d4d59f85fc440d99ffb808ca05e6b721f847798c4d363b3b4a7a6dc6e8e0bf3b5f6061a8e41f2fbe963b0ed892970567be0bb5b6593c045d69161402b25c729f45b90ff5885c70ba77b3e6535a9da96d566362e"}, {0xe8, 0x1, 0x8, "fe98d2eaf61037d73bcd372b05818b0587a4f793e5eedeb52db555a67b553074bea757228c9cffb4efb29205d805d536d9c74d0e21a2b8c78095cc43857edabfe4c5d7fab88f997e8abf87edce1c2b512c246b6af4540e5b8e6ee012b65cb6a4fad466975e2b31cb4a121c387855836a908eb5b2bf140d6a247acef1054f22c29a889fc5d463586ba0734312e8dd2bdc6a198966c9db108f5ebac0e12adf2f6f386a03d476a9a281eed04d2ba1d88bd2768363ecac3af72752ae3cb4c2830d92660358214bc62557a50223872ca4f778c007b1616c1dd86bc97571"}, {0x54, 0x115, 0x2, "c06459459c51ddadacccf1311d1693028e1901c113bd35934b0e409a8d411d1b0ec74e6cf5fa8a1fcac6dee1e2fd699af0e9c1b3c4167bcd1cceba8f33a375476653e2a4e0"}, {0x54, 0x115, 0x4, "5fe737e38a8e5a622b07fa80979afa177a03229e19cac7846021769ebbdc65f339e7d7f0b7d0d4983350249f5a982fac3c9ba42555f799038eac687dfaa943e257434bc72088ca"}, {0x100c, 0x10c, 0x1, "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"}, {0x7c, 0x10e, 0xffff, "2929a789351a8fdf08ca49490ce7b08878c733be35a60e430be6827ed7bb2a653fdc8be0e7fee96844d48a4ab81d0e53515aaa3c057b26eecc655e3d69563ff800993498d8730a4cf835047e7755478bb25a45b72518d13cd11dcdb5b22ad525140a63d84c51341b3096aab306860d"}, {0x50, 0xe, 0x7, "23d484a5c7c13175778e251ed396e8b4ef27e296ff2eafc46b395a536cee600ff005daca61c7cb5df362109177faa5703fc097d4218cfe115785c22c4f816c942bbd528e"}], 0x2274}}], 0x2, 0x44020) connect$inet6(r5, &(0x7f000000e1c0)={0xa, 0x4e21, 0x9, @local, 0x6}, 0x1c) [ 317.716872][T10755] EXT4-fs (loop0): Test dummy encryption mode enabled [ 317.725667][T10755] EXT4-fs (loop0): Test dummy encryption mode enabled [ 317.732836][T10755] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) 13:26:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 13:26:21 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:22 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 13:26:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:22 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x5, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 13:26:22 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) [ 319.118563][T10774] loop0: detected capacity change from 0 to 1024 [ 319.222810][T10774] EXT4-fs (loop0): Test dummy encryption mode enabled [ 319.231577][T10774] EXT4-fs (loop0): Test dummy encryption mode enabled [ 319.238846][T10774] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) 13:26:23 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x6, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 13:26:23 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x2a0, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0xcc, 0x114, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2fc) [ 320.015121][T10788] loop0: detected capacity change from 0 to 1024 [ 320.128159][T10788] EXT4-fs (loop0): Test dummy encryption mode enabled [ 320.137086][T10788] EXT4-fs (loop0): Test dummy encryption mode enabled [ 320.144426][T10788] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) [ 321.507245][T10793] IPVS: ftp: loaded support on port[0] = 21 [ 322.483298][T10793] chnl_net:caif_netlink_parms(): no params data found [ 322.925817][T10793] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.933609][T10793] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.943952][T10793] device bridge_slave_0 entered promiscuous mode [ 323.057155][T10793] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.064878][T10793] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.074888][T10793] device bridge_slave_1 entered promiscuous mode [ 323.282821][T10793] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 323.352767][T10793] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 323.453210][ T2950] Bluetooth: hci4: command 0x0409 tx timeout [ 323.509597][T10793] team0: Port device team_slave_0 added [ 323.559786][T10793] team0: Port device team_slave_1 added [ 323.667439][T10793] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 323.674794][T10793] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 323.703144][T10793] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 323.769773][T10793] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 323.777187][T10793] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 323.805176][T10793] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 324.006023][T10793] device hsr_slave_0 entered promiscuous mode [ 324.035144][T10793] device hsr_slave_1 entered promiscuous mode [ 324.076348][T10793] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 324.084292][T10793] Cannot create hsr debugfs directory [ 324.436577][T10793] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 324.475075][T10793] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 324.516589][T10793] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 324.551129][T10793] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 325.014945][T10793] 8021q: adding VLAN 0 to HW filter on device bond0 [ 325.061167][ T8943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 325.070322][ T8943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 325.093896][T10793] 8021q: adding VLAN 0 to HW filter on device team0 [ 325.126873][ T8943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 325.138974][ T8943] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 325.148392][ T8943] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.155880][ T8943] bridge0: port 1(bridge_slave_0) entered forwarding state [ 325.216940][ T8943] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 325.226608][ T8943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 325.236696][ T8943] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 325.246047][ T8943] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.253477][ T8943] bridge0: port 2(bridge_slave_1) entered forwarding state [ 325.262832][ T8943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 325.273880][ T8943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 325.284956][ T8943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 325.295269][ T8943] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 325.418268][T10793] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 325.429329][T10793] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 325.451553][ T8943] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 325.461531][ T8943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 325.473668][ T8943] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 325.484227][ T8943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 325.493907][ T8943] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 325.504337][ T8943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 325.514071][ T8943] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 325.528509][ T8475] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 325.543314][ T3119] ieee802154 phy0 wpan0: encryption failed: -22 [ 325.548390][ T2950] Bluetooth: hci4: command 0x041b tx timeout [ 325.549780][ T3119] ieee802154 phy1 wpan1: encryption failed: -22 [ 325.655072][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 325.663313][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 325.718575][T10793] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 326.107064][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 326.117578][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 326.195568][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 326.206264][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 326.245285][T10793] device veth0_vlan entered promiscuous mode [ 326.261793][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 326.271159][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 326.311854][T10793] device veth1_vlan entered promiscuous mode [ 326.417500][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 326.427371][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 326.437345][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 326.447520][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 326.473799][T10793] device veth0_macvtap entered promiscuous mode [ 326.495017][T10793] device veth1_macvtap entered promiscuous mode [ 326.506928][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 326.517076][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 326.581469][T10793] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 326.593331][T10793] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 326.603518][T10793] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 326.614277][T10793] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 326.624396][T10793] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 326.635129][T10793] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 326.649314][T10793] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 326.659316][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 326.671449][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 326.714469][T10793] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 326.725449][T10793] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 326.736254][T10793] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 326.747009][T10793] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 326.757160][T10793] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 326.767891][T10793] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 326.781928][T10793] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 326.792607][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 326.802773][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 326.857804][T10793] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 326.867602][T10793] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 326.876766][T10793] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 326.885811][T10793] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 327.333776][ T26] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 327.341712][ T26] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 327.356262][ T4672] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 327.460786][ T26] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 327.469352][ T26] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 327.478635][ T8943] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 327.613323][ T4672] Bluetooth: hci4: command 0x040f tx timeout [ 327.738123][T11041] loop4: detected capacity change from 0 to 8 [ 327.823292][T11041] loop4: detected capacity change from 0 to 264192 [ 327.926185][T11049] loop4: detected capacity change from 0 to 8 13:26:31 executing program 4: r0 = getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) removexattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=@known='user.incfs.size\x00') sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x43, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0x7, &(0x7f0000000080)=0x20008, 0x4) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x22a800, &(0x7f00000003c0)=ANY=[@ANYBLOB='redirect_dir=./file0,lowerdir=./file0,default_permissions,redirect_dir=./file0,xino=auto,upperdir=./file0,default_permissions,metacopy=off,uid<', @ANYRESDEC=0xee01, @ANYBLOB="2c66ef776e65723d99643094982304fd811b373d8a6f6805a5ce9b402c7a00436daa79a70d54ca05f26a1638cc5fee9687ff6be5e1f77952e668fdd7cebeacc28a3cf665e9866dd4eb37bc488c4d87591f04ebd248ddb925d9b429d19ae11c7a1be57d54330aa23079d1c14655eb594eefbcd245", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x87, 0x9, 0x4, 0x9, 0x0, 0x9, 0x800, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_bp={&(0x7f00000001c0), 0x2}, 0x2011, 0x0, 0xe8f, 0x2, 0xfffffffffffffffd, 0x4, 0x5, 0x0, 0x3ff, 0x0, 0x6a92}, r2, 0x10, 0xffffffffffffffff, 0x2) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='dctcp\x00', 0x6) sendto$inet6(r1, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a, @rand_addr, 0x7f00}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, 0x14) 13:26:31 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x8, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:31 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x2a0, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0xcc, 0x114, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2fc) 13:26:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x40}}, 0x0) 13:26:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) [ 328.415345][T11060] loop0: detected capacity change from 0 to 1024 13:26:32 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0xb, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 328.475123][T11060] EXT4-fs (loop0): Test dummy encryption mode enabled [ 328.484453][T11060] EXT4-fs (loop0): Test dummy encryption mode enabled [ 328.491402][T11060] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) 13:26:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x40}}, 0x0) 13:26:32 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x2a0, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0xcc, 0x114, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2fc) 13:26:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:32 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x10, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x40}}, 0x0) 13:26:32 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 329.341237][T11077] loop0: detected capacity change from 0 to 1024 [ 329.397165][T11077] EXT4-fs (loop0): Test dummy encryption mode enabled [ 329.406216][T11077] EXT4-fs (loop0): Test dummy encryption mode enabled [ 329.413743][T11077] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) [ 329.692492][ T961] Bluetooth: hci4: command 0x0419 tx timeout 13:26:35 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x11, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300", @ANYRES32=0x0], 0x40}}, 0x0) 13:26:35 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x36c, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x198, 0x1e0, 0x52020000, {}, [@common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x3c8) 13:26:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:35 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) [ 331.624669][T11102] loop0: detected capacity change from 0 to 1024 [ 331.745344][T11102] EXT4-fs (loop0): Test dummy encryption mode enabled [ 331.754254][T11102] EXT4-fs (loop0): Test dummy encryption mode enabled [ 331.761176][T11102] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) [ 331.782445][T11106] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 13:26:35 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x36c, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x198, 0x1e0, 0x52020000, {}, [@common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x3c8) 13:26:35 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x12, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0, @ANYBLOB="ffff0300"], 0x40}}, 0x0) [ 332.040626][T11109] loop4: detected capacity change from 0 to 1024 13:26:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) [ 332.222253][T11109] EXT4-fs (loop4): Test dummy encryption mode enabled [ 332.230906][T11109] EXT4-fs (loop4): Test dummy encryption mode enabled [ 332.238109][T11109] EXT4-fs (loop4): fragment/cluster size (16384) != block size (1024) [ 332.789381][T11122] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 332.886362][T11123] loop0: detected capacity change from 0 to 1024 [ 332.912946][T11123] EXT4-fs (loop0): Test dummy encryption mode enabled [ 332.921604][T11123] EXT4-fs (loop0): Test dummy encryption mode enabled 13:26:36 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x36c, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x198, 0x1e0, 0x52020000, {}, [@common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x3c8) 13:26:36 executing program 4: syz_emit_ethernet(0x113, &(0x7f0000000440)={@local, @multicast, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x105, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}}, {{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6558}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, [], "94c872e22a46a927ceffd3edd6f6824ffd9345aa4637f5e8d915db2b2e732880dadf96442475a9054570c60728ebe9cd0b73f4bb68f8eb8fdc2badee7210f50eb049e5a50a3807ede131f3f7738a8ebaf549e98f2aa50d6b2d9e95ca163b1f0298b01a06fa030fcd2ea434b26df3e21f15626a0fe4494bb648c60cd0235de1bc752010afde316c010000009c8f37581755cdbf5e2edb7e38e791ca73ba0f746ffc13b9480ad90833106ac2406d"}}}}}}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000140)="5cdd3da12d1f930783fb47ae0f22dd44cd00a1a5f062aa492c0a5ec460b9c6d8cf4ccc3be98a0367983093109ed5eb27e26cc6a7840d37c48dd5053574714aa4e302cc17f690e52c235649444d83452cd12895f82a51b942421dc62002e34e82d7e7137276864a42e632c14a80645670584c41e980a532104901832526c78d18d002293f78b6136a818c5330", 0x8c}, {&(0x7f0000000340)="30d22dc17ca971f224e468a8f8f1fd36902b2ce5555d70701f2fd039de3d35d11a73fb6f6bb5eb1604f1fad3521f6cb72dcb2c00b59311c6e9013e55ecf214fe4fe4f73ef21e14d466956ac5d5bc59ab7a5c1d8ed75fedbc4a4956404a7782b6ef5e3503365b6faefcb87b4024d07240cd51e94fe2609cc45fff3d14c857e62ea6a81c2c82c6051fd785dab0f9871bdad7d517dae0af0a73ceda90b8e55bb7d254f6641bcb9e0a9a8bdf292db9f5aecb565a290edf5be3e5368f61cc35cf8af9f081bd01bcea31639682c5abec962a2f1318a219775deae45f637b0d16e136e4000ee6569d337074012ee97dcb30b5dcacfe3472608bbd339b309c", 0xfb}], 0x2, 0x0, 0x9) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) utimensat(r0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={{r2, r3/1000+10000}, {0x0, 0xea60}}, 0x100) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f00000002c0)={{0x2, 0x0, @remote}, {}, 0x0, {0x2, 0x0, @broadcast}}) [ 332.928738][T11123] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) 13:26:36 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x13, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300", @ANYRES32=0x0], 0x40}}, 0x0) 13:26:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:37 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x14, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 333.837120][T11137] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 334.053145][T11138] loop0: detected capacity change from 0 to 1024 13:26:37 executing program 3 (fault-call:1 fault-nth:0): r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:37 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x3020000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000000080)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000140)={[{@nodelalloc}, {@bh}], [{@euid_eq={'euid', 0x3d, r1}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@subj_user={'subj_user', 0x3d, '\x00'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@subj_role={'subj_role', 0x3d, 'nodelalloc'}}, {@obj_type={'obj_type', 0x3d, 'nodelalloc'}}]}) [ 334.213492][T11138] EXT4-fs (loop0): Test dummy encryption mode enabled [ 334.222537][T11138] EXT4-fs (loop0): Test dummy encryption mode enabled [ 334.229489][T11138] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) 13:26:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000000000000000000008000300"], 0x40}}, 0x0) 13:26:38 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xc0}}, 0x0) [ 334.723631][T11147] FAULT_INJECTION: forcing a failure. [ 334.723631][T11147] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 334.737080][T11147] CPU: 0 PID: 11147 Comm: syz-executor.3 Not tainted 5.12.0-rc6-syzkaller #0 [ 334.746013][T11147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.752338][T11147] Call Trace: [ 334.752338][T11147] dump_stack+0x24c/0x2e0 [ 334.752338][T11147] should_fail+0x8bd/0x9e0 [ 334.752338][T11147] should_fail_usercopy+0x39/0x40 [ 334.752338][T11147] _copy_from_user+0x63/0x300 [ 334.752338][T11147] ? kmsan_get_metadata+0x116/0x180 [ 334.752338][T11147] ipv6_setsockopt+0x510/0xaf30 [ 334.752338][T11147] ? kmsan_get_metadata+0x116/0x180 [ 334.752338][T11147] ? kmsan_get_metadata+0x116/0x180 [ 334.752338][T11147] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 334.752338][T11147] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 334.752338][T11147] ? aa_label_sk_perm+0x822/0x980 [ 334.752338][T11147] ? kmsan_get_metadata+0x116/0x180 [ 334.752338][T11147] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 334.752338][T11147] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 334.752338][T11147] ? __fsnotify_parent+0xfb4/0x1000 [ 334.752338][T11147] ? kmsan_get_metadata+0x116/0x180 [ 334.752338][T11147] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 334.752338][T11147] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 334.752338][T11147] ? aa_sk_perm+0x9a5/0xed0 [ 334.752338][T11147] udpv6_setsockopt+0x15b/0x220 [ 334.752338][T11147] ? udpv6_destroy_sock+0x330/0x330 [ 334.752338][T11147] sock_common_setsockopt+0x16c/0x1b0 [ 334.752338][T11147] __sys_setsockopt+0x94c/0xd80 [ 334.752338][T11147] ? sock_common_recvmsg+0x2a0/0x2a0 [ 334.752338][T11147] __se_sys_setsockopt+0xdd/0x100 [ 334.752338][T11147] __ia32_sys_setsockopt+0x62/0x80 [ 334.752338][T11147] __do_fast_syscall_32+0x127/0x180 [ 334.752338][T11147] do_fast_syscall_32+0x6a/0xc0 [ 334.752338][T11147] do_SYSENTER_32+0x73/0x90 [ 334.752338][T11147] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 334.752338][T11147] RIP: 0023:0xf7f88549 [ 334.752338][T11147] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 334.752338][T11147] RSP: 002b:00000000f55825fc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 334.752338][T11147] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000029 [ 334.752338][T11147] RDX: 0000000000000040 RSI: 0000000020000640 RDI: 000000000000002d [ 334.752338][T11147] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 334.752338][T11147] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 334.752338][T11147] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 13:26:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:38 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x15, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 335.169157][T11150] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 13:26:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[], 0x40}}, 0x0) [ 335.538384][T11154] loop0: detected capacity change from 0 to 1024 [ 335.718086][T11159] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 335.730433][T11154] EXT4-fs (loop0): Test dummy encryption mode enabled [ 335.739166][T11154] EXT4-fs (loop0): Test dummy encryption mode enabled [ 335.746315][T11154] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) 13:26:39 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x11, 0x80a, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bond0\x00', 0x0}) r3 = openat$ocfs2_control(0xffffff9c, &(0x7f0000000400), 0x410002, 0x0) getsockname$packet(r3, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000100)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r2}]}, 0x28}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000180)={{{@in=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@empty}}, &(0x7f0000000080)=0xe4) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=@dellinkprop={0x128, 0x6d, 0x100, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r4, 0x20000, 0xc120}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}]}, @IFLA_GROUP={0x8, 0x1b, 0x80000000}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_AF_SPEC={0x30, 0x1a, 0x0, 0x1, [@AF_MPLS={0x4}, @AF_BRIDGE={0x4}, @AF_INET={0x20, 0x2, 0x0, 0x1, {0x1c, 0x1, 0x0, 0x1, [{0x8, 0x19, 0x0, 0x0, 0x1}, {0x8, 0xf, 0x0, 0x0, 0x6}, {0x8, 0x7, 0x0, 0x0, 0x10000}]}}, @AF_MPLS={0x4}]}, @IFLA_MTU={0x8, 0x4, 0x80}, @IFLA_EVENT={0x8, 0x2c, 0x2}, @IFLA_LINKINFO={0x38, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x28, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MACADDR={0xa, 0x4, @local}, @IFLA_MACVLAN_FLAGS={0x6, 0x2, 0x1}, @IFLA_MACVLAN_MACADDR_MODE={0x8}, @IFLA_MACVLAN_MODE={0x8, 0x1, 0x1e}]}}}, @IFLA_GROUP={0x8, 0x1b, 0x2}, @IFLA_VFINFO_LIST={0x6c, 0x16, 0x0, 0x1, [{0x68, 0x1, 0x0, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0xffff, 0x80}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x0, 0x7}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9, 0x7a}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x1000, 0xfffffc00}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x8, 0x7ff}}, @IFLA_VF_MAC={0x28, 0x1, {0x1ff, @broadcast}}]}]}]}, 0x128}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 13:26:39 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x16, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[], 0x40}}, 0x0) 13:26:39 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) [ 336.513716][T11168] bond0: cannot enslave bond to itself. [ 336.591592][T11168] bond0: cannot enslave bond to itself. 13:26:40 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x11, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:40 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x17, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[], 0x40}}, 0x0) 13:26:40 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000005c0)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/206, 0xce}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f0000001b80)=[{&(0x7f0000000700)=""/143, 0x8f}], 0x1, 0x0, 0x401) syz_emit_ethernet(0x36, &(0x7f0000000040)={@multicast, @multicast, @void, {@ipv4={0x800, @icmp={{0x8, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @broadcast, {[@noop, @ra={0x94, 0x4}, @ra={0x94, 0x4}]}}}}}}, 0x0) [ 336.894972][T11175] loop0: detected capacity change from 0 to 1024 [ 337.000797][T11175] EXT4-fs (loop0): Test dummy encryption mode enabled [ 337.011490][T11175] EXT4-fs (loop0): Test dummy encryption mode enabled [ 337.018933][T11175] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) 13:26:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:41 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x88, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:41 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x18, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x40}}, 0x0) 13:26:41 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x10, 0x20000000000002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="240000001e0007041dfffd946f610500070000001f00000000000400060005", 0x1f}], 0x1}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfcfa) sendto$inet(r3, &(0x7f0000000240)="fa8aef84b9ac6bd9d941419b2d85286da74fafa019ba4a23620b807ab12270cfb6b8c0fbd4d5ab445a839ffb7710073a82f3ea25223204fa993e54f4ec5e305d0fbe63dd0b6a35f74e05b3ebcdbba5ca5aa6961faecedb483900b82f67751583ba41b425581e91e021c5ac80d9404eef897389f3a15cb2b92a54db0532ba0eb0ea521b008a428e76f90be081f5f92b2137f4432c58c2a32ba93047f72b32ebf57cb75d1068e995fd77672e7edc5f83caa821dd516cf5deab12ea", 0xba, 0x10, &(0x7f0000000300)={0x2, 0x4e20, @empty}, 0x10) splice(r0, 0x0, r2, 0x0, 0xa360, 0x0) r4 = syz_open_dev$I2C(&(0x7f00000000c0), 0xffff, 0x0) close(r4) r5 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SIOCAX25CTLCON(r5, 0x89e8, &(0x7f0000000180)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, 0x6, 0xf0, 0x2, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}) openat$binder_debug(0xffffff9c, &(0x7f0000000200)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) r6 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f0000000380)={0xffffffff, 0x1, 0x0, 0x6b15, 0xff, "cf1aa3804769da172df58dd5e1d39f3618872a", 0x1f, 0x80}) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TIOCMBIS(r6, 0x5416, &(0x7f0000000080)=0xffffffff) [ 338.080571][T11193] loop0: detected capacity change from 0 to 1024 [ 338.152574][T11193] EXT4-fs (loop0): Test dummy encryption mode enabled [ 338.161246][T11193] EXT4-fs (loop0): Test dummy encryption mode enabled [ 338.168446][T11193] EXT4-fs (loop0): fragment/cluster size (16384) != block size (1024) 13:26:41 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:42 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x19, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x40}}, 0x0) 13:26:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f00000000c0)="eb", 0x1}, {0x0, 0x0, 0x10e00}], 0x808000, &(0x7f0000000040)={[{@fat=@dos1xfloppy}]}) syz_mount_image$gfs2meta(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x1, 0x4, &(0x7f0000000140)=[{&(0x7f0000000280)="d7375c20aa25090f9fdd5a29720ecea4e38b45a82611460797e3b566e13f72471946539aa64d0cf3c194cfb5bd0a324225eec45e39533d3651ebf19b06ef27b0b67805732f46f86c06a675c4fc7bc02b3a532becd0fe7b171b877fc7e005fcd592a17b5db88497bb38c1211e533d9a54acf7545b45f0f8c33884453d63a11e3e9a7382d4c6186d2d58361e8ceb610c17ec12823bed5589beb1500556171f63bdc152b562cab925a531a872ba327318e95eae548bb7c2cb494e0e16be97fd6590c13d0c81c945e92ec520f370a6d00773faa8f45592e3a4ab002ab107876e87cc3a763e09d2ae0e7e7540070120d11c8aa24433c79cad3bc80d1e06af346e3c1da54111cfeb761892e51ea79af2166d358b501db1d5c0451cdbc1cce6dcbb127dc7dc67ed8f602975eb4060371258fa6cd109cb0d461127e635032ffd3ae678da92d48fdd198376a041d165a3be77bfdd697674da49db8b53efa5a1edd403b6421f24784e1fd4f815556f7b6c2611630b94f67f86c8ed7be5c1ecadefd9f907f4fa4316032a203931c4f1b4adb27824d97f4f99daf358f98ff305b6f8cd3950958b750524989f0fb4138d56381026d04e0fdd5340a5592f1eb0112968b35e9550dea2dbac4d5aee7479960541f183f3e1471f4d746b5f426196f49fd0cf299baf95d7f9604a718fb796acbe9269abef0070fd343c8c31ba76fbf62a94059003a34822628c8ade93367f882d857238971d1dbc4285c80752c430afc5bdb78f10c45fd44ddb9e1c65b2bbabdb6f672325ed94f5d1f4c27133c9ab03c88bb3ddaeff2bf0f8ae66fcfe9004f6cdaeba3907ab2e884a55dd831ed60a7e2f62d5d2149614c6961e0053ea2a3049cf13fca3a89ace64cc9f5f65db90f80bd65dab99597d51e89125d4d5e13d7991a16bf90c3b2de3bea2505667578b1cb68dba9dd929da5285c2c921ecc4ff3568cab3738d658ae8b661d62213b72a3b9355373e0dfc63ef8b3a0bc43c1467e0d2307da64db2414832fe219d461d26f9bfd369e20fc18d55c9f4148dd88c9b97b5808a31db4187c21713e7b6d43040089b02d5b1cd68b152265ffef5b1d6eb1e6eb05c071e7a62529cad194e5527e2449647c583d8c9595a293e0bcbb23517e523206b8ebe020a6d5429dfbf43c865dc6cb363deeff06064d3ffa3a3d0f0a809b305e85dd06850445fb8945ba2c40bae0ba5021df757aded3f5735ccf61603f5b219227942079fe732776cdf456fc6ebfc30accf0f20707635515cff88dbc7d05943e8b5a6062a861df5d737fbbb1740a98edc5171e7cd02729cbbd3cc07995c825a4b315cb79251c6600ca4ac3fb4a5d7569fb729d084af610480aa1b280d9ab6ff7c48a11890596e1202f84021d6538ec10a76ae42ad855e352842d778e218ad6d86e207e841dcefa4e76c86687fa04ead4dc48271ccfcc83cab87c58843ce5fd313fc821b788ea567045725d087fd48d764bb9c6f58052d49fb733ccaa0794ad7384976b91078a89ea96a0d13cb0c84f3ef952a6e98e267b574504ffb5e129afe1d0ecdf0605d98108bd55d47ec9f33470b786074b073a6eb4373efd84494dc90183bb414746a2fc5203c1eba46b3bb6fd1b18a076774340e168944f72b72c76c98d0f5fdb566482a14cd325186ca98e5f6c664a6321b7ecb5cd3368cc00d0d584816591d15564cc87a3ff1a312188ce5301e45f3cc59e7e560608ed770fe75ea53435fc39ee97c0063e586ab21187014ab15a11f6a78ea94e6d8da7e9a68f5f9bb16b2db266c27ae8b9099629598a5680a600ce23bc79fb8c5d431869de86b0121db2a0c5a825e9e5ebf3eefc3d723961220f8e50b03c8b12b406c8db1592dc57db26edeb78a034fe7419163c3604cb4ba480b030fda6cbd2b82f7a8ab818c0f25cbd7b130aff64e6b48809004fa1570b0ea777e4387bc96053dac48665a50904e29f3c3c74d20c039989ad11cdadca213f0040e6f9da93b90d37236a06ad326fe90b49575bc9e14ce5952aad497252b4a87c055618965eccde5bddb5b3ad08142c72eb4ea91d41327fe98413bcbb31075406d070a55ae81947056f599c431ae5e7326e5daffd054c4a5cf55c26c2f21ba6264d03ad33bd8ffecc04d7b7b5b58c9521ccca5876ec2cce293f1be44f6d24b2dfe80dd9908e382589733bf17f3f19a66189e330127ac5c7114e52c743f0ab84aabafbcbb87de487ae84b897ad79fdfb339893f7915cbaa6c6243e03f1b373c2cf41b6415c02b91beba747b71cdd396c2314cdfff7e542ab2eb7749f92edad4a73ca3aef8eca1d631d1c45e63ce286c3206ef0de9efc1ee2b0e3346ae32b44beb984bc8f5971c3476623b4a67b214eb89aa1486183b53a69ee63e42245ec3bc28fe4d77dc7112641d55b1bc6f964239187821b2f999f1c22b2ca97a8e81dbfaa23cdf27907d178616d6dcd6185bcb4b2a54e1723a1acfbeb32b9ca854330260e97a8e590f0de6dd099dfac78ad9c7f1af5f193683fe4fa6323d47181460521e2df84ee82453cb95026f53fecc9c3fe8a54a14d62961822273fcaa4b4bfc230fe05ae4f71ae7870ceb4884e4a15f924d180e499838bceac4ce250a64fa8e82b581d3a3012a0efca484eafdabd639d64eee071b878bc44cbb2b214f0d21d9d734a2a46c147fb843285b398960b4fb4fb5ffb497260c964b611420959b81fae049651811f3d69a1a025ab8bf8c7374b066b9ca4fd6cb447e5ec5d9259b971b6c5df68cbaeef3d567d59d4792bfcf33838f93d92ffd6d2bdd5be5ad59abd1df472cb097bba86f909e2e6e739204cb1fd005ed66032d4851b7af21e8f3b6b2ba6fbc4f38c47e1b75aba231eacb077c7b3193157eef4af823dc402fb47292ecb5234fb105c0a29b6fcb35640e9881e895a21a4ce2e2dfbc387bc92e43ab1fb2dc118056ac556984abf6f27869956e7cf95b9635c534e4c86fab2ddc400bf113c31af4b1e8491dd311bcd6851ca185bf5258d5d14e782b70ecdadf3776a941a2a884034c6ee4b4906f46a4535ee0670012743e4c41d76e3b2b15b53c4165fd9fbfb49a61ae7052adeadfc54960aa107221da9483ee578b09a14487649e99ffa7aab0dc5bd52e6596f7d53d183a5597686bb22e8e436cb96d470019c115908beeaa082acc378827e90f010e2daa0cbc7afa4c7933a0a4a497307eca3da1ba4136806abc9e382ef8c465852d125d325b68c7a6f86763bedcba6e1c49896f2df0653f375a9162f6ccbc0b88fa95e071e1282eef3cc7d3b8ba3b8c31f7620e892703c48f45562c0a735dd3bf92a00a1ac37a7d273cd4371f8f84536aaa1e1511e9a27f5a4410c31f44f1ae4cb5cad70796cadab4ca54cb1ecc1c23b7ee14cd34b6e6127186cd1f379d7f3b82dc4f8b7475dde291294e60440e161291baa0fda92b64232154983139f255c23700fec125075d320dcca9aa47a80e98afaeeb53c4a49ff5d65b6726f081990645c871614a6f387ef89fe3765cba2ae2b3015e68477670409f55d3fb58eb71b0705b524a7545873e6007de635e94be3470162fc2468eb65a44b29244937a3eb232d982fc2e2db6e7e62386ed0efa3c43c34b0738f9c977d5249d852152b2b22144b9901b2ffc24e9cecb33c05f64f799676da8ee8b43c16f5b9fd3827c274adabb9f6bf5125446d3c97dab5a5953c41483e17a94c0cc7ee93a777498b63a052ff69b94e91c8d65d3126fc3000e1767ceee7b693d69f44cee2a66cf156eba3be8581bfdad4e1d4b892dbe68b0fff3d6fa05b020faaa2751ef62e7d6a4c9c9ba0d050a23366b2625bfb9561acd16016101f013410ab238ca7827bfb5f2c81bbaca6e34ca8dd984f7f7caa7aae051616e74e57d3e1aa3ed18bc82440dc82bed297087065f3fcf4888e47fec96aa6993178666ad9cb84815053bd8c1b64eb50c7f9df9b976d9d2b8af91efc7a0eacf9c1c823a97771bfcd6d767c342f9b553a5f21281dc855ccf62352904b3e1f2dabff9b23b05ce21a71da72c139b03bce84973f9a79418b4ab063d0de98e4078271358c8a4f841253649d4b18f67b5da521db84a41963eacef299324e2a1da337571a92179800bc1d982cd9c2da4d2b9cdca23f0c8845cda1e92233b2af13987cfaa476ddfba2986d551e1dbcf83ea73235cc7958ca5ba3abd25a4792b371ff5344e1c25b7241f35200da67f04ca1a391108b0adb6bbea49a07c137f427b8bd3bfe43f71b98301ff43bf97687d98c7e17ed09cf0503408b39080cfa9e6d1a551d74200bb2b2804096b336baa39171ed09dbf564e87646ec2bfa6471208826cfdf7c4a42e4ce50d3b7e71ae85ed56ee906b69a2624bacf8c28b3455d006a7b9556f7d87a513df44cdd340a2d47ed7ae39de4c706a0d8e5044672e5c0733f2fe6150a77de40fd6565e42626082bf7cd2d3f365c68aa227f57052ed30bbd51555c4d48f617c9549cf377666feb8c167c22de52792eddb0a9b3bbefd6b9c686165311dc5638a5e7073e81ddf027edbfe74b5af1a85020d4aaf3cda1c25ab587ade43c6e8714b7606397b073b0edff0a0d0d52f397d13c04c0d3cc385e1b9efc7cb285179d69f291ff8543dec6a3de61291f98efbcc978db630501c8f49c427e648c6d554cba2a0712eb3dae2703291bc756f1a924f05c54f5e702f90f3250153e534d1fec04662c96e20fa8a1e6ed2bd753518b18f13631672e6c07669792c973740f1dadd88e08ac79bafa3f1d7151370e54399ee0eac721f14155c2521c1158218ccf5d3d617aa4698596c6a34c9e940b36dd044779e85b02917f1f3504a6066a2700fe801221a42f1472955f4fdcecba869c6a1e2581aa69e99ab8f026ba3599deddfdacdf3aa2b4359662a7e376c1d4d7b91be0a1e76241eee5bedec0d1b779bc907e32afb4f6fe685afcdb4130e5531607e33b2e2b5b329a49b60f180cbd34646d95bf793cc0de7be90220f5dc18199f275699e2385fa16e66128952e1f9a60a3d568ac52b63d06a2fe6b184811596c239de957475bacecd87f5c9b6ab0b2a9bd37b7062ae4847f7ed610f7f01b8df63c82ac77024c120f9d0d0961ea5d913419582349966515b5a658dfe712f479b5118eca2ebde83d571c7f4dd7a8ba65472743541936b17c8a4780065e39dfe51fd823435b3b866c063ea07f72b735e7387812ff905cabc12f9bc577e0a738f1d20b137234ad1bdccd259cfa5b9bb6243a26f06cb5c19de779df3c800eda1adc38ea5d49e85b43ee9272b56d5e7035ce6ef4f875cde175d467804edead68e0ee6a0190928551f0bfc1d4b66aa3ca69d22ac0c1fac8fcb1ec298fa353225843f9b96dd9c636012f07cce52a2d8b71c3f39e5e55ffc70e966d18f6e9df0393a3d5497b29d876f602f21722c7aac39326541f5594e9605e81d6b328e75e4c3b3a85e1e33b4b785237214704608fffbfbc44df701221d597faa150fb074af0737b561f2fe6efb0ffc7b53244ef1c06cd5aba4f0adc306b9feb9c183a8cb1de941e2980da76491a689521ac1b3aa607b21e14b71d986aa524a9a767915c0f51302c6a00ea072562a7ce9182a5043fa477de78e2ace99b52be74b78b7116740f6f0b9c67d414ff1828e1b1fcd6045e41235c32a92dbd346193a2db47ffddea3648b1e93b3e396f1353919feb58739f280dcf825f7aea91b49f94e206eb29ab687195123cf062a353e3a25086d51fa5bfc5b2e1e69948a7bae02c7261320fa965f78f116e301c601d3d33b55b74e3d5ed1e0a3f9f505e53d3c565e978c7f07cbdd2e857b59e88", 0x1000, 0x100}, {&(0x7f0000001280)="df180f81ccba3e32de44601fdfd82770edc040553754d9b1445b911188b1249c79100ddcfaf5989242673dcd5730af08651727c7deedf33478c74cd8749896281c8e46c7e6b7917d73ffed14a0822b32972340155039c90f6cf236b844759bbdf9aec16084580d50bcc7bd8438da84ec5198f19489717717583bfcccd30abeee1cc9d453c3ab292e36c9a46bf97ddc639721097b0acc70186fe8ffa91ae87e4fa16c2fea624e3dcaccbf14c03ab1d0544660fea18e72ed1e3fcf7c6108a3e585461f96d0382d5d1765f0ca1c2fc3552d80d9a2eacb43e230", 0xd8, 0x2}, {&(0x7f0000001380)="6e1a9bc5fe0566a6ea4293129a35aa52903ecd0d75412fe2e3a4c48527bd2f32934627a51218779850437d023a3a1ea2ab302311c9efa68175330e4c2d050a05b2e1b0b3dfb48d54a1c0dbc9aa08719127301de5575724cd0e89455a54f01fda739b8c6c461c72d75492fa9d00005bf7e364571427ab220309d0ab20341900112af254671f85635a9fa6679487b44bc08b317505e18f6b48be50837defc927f7", 0xa0}, {&(0x7f00000001c0)="a2e3b744d7150660bc9c823bf3552d3af44397cbeb50873424e416b635c098a337163d188f673a76f7d07fcdd72fd56a73a0729b5096663ff074cb24d8e14e770e3fdcb38607d31f17f5f452bbfda44c2c764047a2c7f234219651dc0c4b17897744c3a5da", 0x65, 0x200}], 0x4000, &(0x7f0000001440)={[{'-\\{}*]{(\''}, {'dos1xfloppy'}, {'dos1xfloppy'}, {'vfat\x00'}], [{@euid_lt={'euid<', 0xee00}}]}) 13:26:42 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:42 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB], 0x40}}, 0x0) [ 339.326056][T11213] loop0: detected capacity change from 0 to 1024 [ 339.447081][T11213] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 339.452773][T11216] loop4: detected capacity change from 0 to 270 [ 339.606563][T11220] loop4: detected capacity change from 0 to 8 13:26:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a0001000000000000000000"], 0x40}}, 0x0) [ 339.689467][T11220] gfs2meta: Unknown parameter '-\{}*]{('' 13:26:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) [ 339.802908][T11216] loop4: detected capacity change from 0 to 270 13:26:43 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000100)=0x3) r3 = openat$khugepaged_scan(0xffffff9c, &(0x7f00000002c0), 0x1, 0x0) write(r3, &(0x7f0000000340)="f98ee78feb8c84e29abc8af57e8db9b4626fd5e5ac355cfdc64f789afdbbf4bf4500892de6201bf48b77e037ca155be2e9d367366c2c74599c9ffeeadf49b2606d743773a3b5d74dda542ee011ce8e576390b68537960615d5e699a4a291dbc58ec217deb8e0fba5ddff594c27efbe6983d759ed606cb9d5b56d5e285f71def90f6024d1fbde87c55c1ce786bcd433794bd06262589a3c", 0x97) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x5, 0x9, 0x1, 0xff, 0x0, 0x401, 0x300, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f00000000c0), 0x3}, 0x40, 0x1, 0x8, 0x6, 0x0, 0x9, 0x3, 0x0, 0x1200000, 0x0, 0x93a5}, 0x0, 0xd, r2, 0x2) r4 = perf_event_open(&(0x7f0000000240)={0x1, 0xd3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r4, 0x0) mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6, 0x13, r4, 0x7) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) close(r5) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x1d, 0x9, 0x3f, 0x1000, 0x84, 0x1, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4}, 0x40) r8 = socket$phonet_pipe(0x23, 0x5, 0x2) sendfile(r7, r8, 0x0, 0x7fff) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2, 0x11, r6, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r6) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000400)=0x1, 0x4) 13:26:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a0001000000000000000000"], 0x40}}, 0x0) 13:26:43 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1b, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 340.469318][T11239] loop0: detected capacity change from 0 to 1024 [ 340.491753][T11239] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 13:26:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) [ 340.836429][T11246] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 13:26:44 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x5, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a0001000000000000000000"], 0x40}}, 0x0) 13:26:44 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1c, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:44 executing program 4: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0xbb97c76906da83ab, 0x80) ioctl$FBIOGET_CON2FBMAP(r0, 0x460f, &(0x7f0000000040)={0x1000038, 0x1}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x13, r0, 0x0) clone3(&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x75) preadv(r0, &(0x7f0000000780)=[{&(0x7f0000000140)=""/185, 0xb9}, {&(0x7f0000000200)=""/160, 0xa0}, {&(0x7f00000002c0)=""/228, 0xe4}, {&(0x7f00000003c0)=""/196, 0xc4}, {&(0x7f00000004c0)=""/211, 0xd3}, {&(0x7f00000005c0)=""/62, 0x3e}, {&(0x7f0000000600)=""/180, 0xb4}, {&(0x7f00000006c0)=""/173, 0xad}], 0x8, 0x9, 0x3) [ 341.342971][T11260] loop0: detected capacity change from 0 to 1024 [ 341.470969][T11260] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 13:26:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x0, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x6, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:45 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1d, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a00000000000000"], 0x40}}, 0x0) [ 342.156473][T11278] loop0: detected capacity change from 0 to 1024 [ 342.200394][T11278] EXT4-fs (loop0): Test dummy encryption mode enabled [ 342.209302][T11278] EXT4-fs (loop0): Test dummy encryption mode enabled [ 342.219162][T11278] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 342.230902][T11278] EXT4-fs (loop0): group descriptors corrupted! 13:26:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x0, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000200), 0x0) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000200), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r4, 0xc08c5335, &(0x7f0000000100)={0x0, 0x81, 0x0, 'queue1\x00'}) dup2(r4, r3) flistxattr(r4, &(0x7f0000000240)=""/244, 0xf4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000100)={0x0, 0x81, 0x0, 'queue1\x00'}) dup2(r2, r1) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40046607, &(0x7f0000000000)=0x7fff) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x20, 0x0, 0x25dfdbfd, {}, [@IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x4}]}, @IFLA_IFNAME={0x14, 0x3, 'netdevsim0\x00'}]}, 0x3c}}, 0x4000000) [ 342.561453][T11287] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:26:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x8, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a0001000000000000000000"], 0x40}}, 0x0) 13:26:46 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1e, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 342.975205][ T961] Bluetooth: hci0: command 0x0406 tx timeout [ 343.053252][T11294] loop0: detected capacity change from 0 to 1024 [ 343.086862][T11294] EXT4-fs (loop0): Test dummy encryption mode enabled [ 343.095703][T11294] EXT4-fs (loop0): Test dummy encryption mode enabled [ 343.110632][T11294] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 343.120383][T11294] EXT4-fs (loop0): group descriptors corrupted! 13:26:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000200), 0x0) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000200), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r4, 0xc08c5335, &(0x7f0000000100)={0x0, 0x81, 0x0, 'queue1\x00'}) dup2(r4, r3) flistxattr(r4, &(0x7f0000000240)=""/244, 0xf4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000100)={0x0, 0x81, 0x0, 'queue1\x00'}) dup2(r2, r1) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40046607, &(0x7f0000000000)=0x7fff) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x20, 0x0, 0x25dfdbfd, {}, [@IFLA_VFINFO_LIST={0x8, 0x16, 0x0, 0x1, [{0x4}]}, @IFLA_IFNAME={0x14, 0x3, 'netdevsim0\x00'}]}, 0x3c}}, 0x4000000) 13:26:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x0, &(0x7f0000000200)={[{@test_dummy_encryption}, {@test_dummy_encryption}]}) 13:26:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0xb, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a0001000000000000000000"], 0x40}}, 0x0) 13:26:47 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x21, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 343.911015][T11313] loop0: detected capacity change from 0 to 1024 13:26:47 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x1496d, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, @perf_bp, 0x8, 0x0, 0x0, 0x0, 0x0, 0x6, 0x81, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x1) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = syz_open_dev$loop(&(0x7f0000000040), 0x763, 0x141a82) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, &(0x7f0000000340)) pwritev(r1, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) rt_sigtimedwait(0x0, &(0x7f00000001c0), &(0x7f0000000400), 0x0) ptrace$peeksig(0x4209, 0x0, &(0x7f00000004c0)={0xffffffff, 0x1, 0x8}, &(0x7f0000000840)=[{}, {}, {}, {}, {}, {}, {}, {}]) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) perf_event_open(0x0, r2, 0xa, 0xffffffffffffffff, 0x2) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000003c0)={{}, 0x8000003, 0x4, 0x5}) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x5, 0x0, 0x8, 0x0, "5b6e292f20ad1c12271675c48e0a829f91b97739809d64e8290016798a44aaf614fac6a21d3dcf2b3e871580f53cd809f98e0000000000000031ffffff00", "f8b699c929b92ee722240b5b4c44a41eb88c87cff1866be0bec480ebc5c2189e", [0xa9, 0x1]}) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x18) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x20, 0x9, "2bbb19e5631df896ba98674d0b4703551f0d03e207000000eb801d897649292487be6979a0b60bafc062c41c7373af99ecff00", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7, 0xfffffffffffff882]}) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000600)={0x0, {}, 0x0, {}, 0x0, 0x2, 0xe, 0x0, "641f738624679713ddee573f4b3e937f520d11dea6b6892979b70eb1f3e79c3856d788e3188ac0e792a061aee7ef6fc3a31cebc504d6d790e331ce9bb00f50a1", "18a4fa05cd8e41a6cd843acc762cf3fd6b38a179b93e896f6f2c0405ffb2b018", [0x8, 0x101]}) fcntl$getown(r1, 0x9) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 344.154831][T11313] EXT4-fs (loop0): Test dummy encryption mode enabled [ 344.163835][T11313] EXT4-fs (loop0): Test dummy encryption mode enabled [ 344.327292][T11313] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 344.336971][T11313] EXT4-fs (loop0): group descriptors corrupted! 13:26:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a0001000000000000000000"], 0x40}}, 0x0) 13:26:47 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x22, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:48 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x10, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 344.608701][T11323] loop1: detected capacity change from 0 to 1036 13:26:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, 0x0) [ 344.773315][T11323] loop_set_status: loop1 () has still dirty pages (nrpages=16) 13:26:48 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x23, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 344.916709][ T2033] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 344.927950][ T2033] Buffer I/O error on dev loop1, logical block 0, async page read [ 344.936461][T11326] blk_update_request: I/O error, dev loop1, sector 384 op 0x0:(READ) flags 0x80700 phys_seg 32 prio class 0 [ 344.953323][T11328] ldm_validate_partition_table(): Disk read failed. [ 344.960119][T11328] Dev loop1: unable to read RDB block 0 [ 344.966054][T11328] loop1: unable to read partition table [ 345.099095][T11328] loop1: partition table beyond EOD, truncated [ 345.106008][T11328] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 345.262251][T11323] loop1: detected capacity change from 0 to 1036 [ 345.342847][T11338] loop0: detected capacity change from 0 to 1024 13:26:49 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x11, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a000000"], 0x40}}, 0x0) 13:26:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, 0x0) 13:26:49 executing program 4: syz_mount_image$xfs(&(0x7f0000000000), &(0x7f00000002c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000040)='XFSB', 0x4}, {0x0, 0x0, 0x1}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='@']) 13:26:49 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2a, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 345.952630][T11352] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:26:49 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x12, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 346.125904][T11355] loop0: detected capacity change from 0 to 1024 [ 346.287737][T11360] xfs: Unknown parameter '@' [ 346.366175][T11360] xfs: Unknown parameter '@' 13:26:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a0001000000000000000000"], 0x40}}, 0x0) 13:26:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, 0x0) 13:26:50 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2b, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = memfd_create(&(0x7f0000000040)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>\x9b\xafI\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[], 0xff67) sendfile(r0, r1, &(0x7f0000000000), 0xffff) fcntl$addseals(r1, 0x409, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) preadv(r2, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) fsetxattr$system_posix_acl(r1, &(0x7f0000000140)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8847}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=@ipmr_getroute={0x1c, 0x1a, 0x800, 0x70bd25, 0x25dfdbfc, {0x80, 0x20, 0x14, 0x20, 0xfe, 0x4, 0xc8, 0x5, 0x1000}, ["", "", "", ""]}, 0x1c}}, 0x10) 13:26:50 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x13, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a0001000000000000000000"], 0x40}}, 0x0) [ 347.136312][T11377] loop0: detected capacity change from 0 to 1024 13:26:50 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2c, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:26:51 executing program 4: r0 = memfd_create(&(0x7f00000002c0)='\vbm1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff\xc4\xf3yz\x02\x00kM\xb2\xd4k\xa2\xcc\x19\x1b\x12\b%\x92ACa\xeb\xf3\xe6L\\\xbcZ\x8b?\xd99Q\xbc1\xeak\x1aj`\xb5\x8e\xd1H\'\x11\xf2P\x01h\xb8\f\xb6\xd6\x96\x9d1\xedo\xe1\x8b\xcc\xf5\xba\xa4a#efb\x8f\xd2\x9a\xbf|\x15\xd7\x16S&\x18\x89;\xf8\\\x80\xec\xaa\xdb\\\xaa\\Y7S\xb9\xb3\x17T\xfb\x92\xbac\xe6\x95|\xbfB\xf0\x8b$\x14\xa47\r1J\xb1\x19g_\xa8V\'\xd2n/\xf4\x8a\x00x\x15\xb6w8\x19~\xff*h\x16nb\xfdna\xed\xaf\x95\xe7+s\xb2\xe7\xebP9\x19\x02\x11h`6\xfaA5\xf8Eyc\xb4m\xe2\x94CK\xf6\x14\xd7Q<\x87 \x89\x98\xcf/\xa5;d\xe8 \xb3-]\xb0k\x87T\xc7q\x86`%?R\xb4\r;F\xef\xd9\xeej$\x99\xe4hR N\xbbi\x90\rn\x83\x13\xd6\xea\x06+\xc8x\b\x14\xe2\x0e\xab\'V\xdbm\x8e\xd7\x8eKu\xbbv\x03$\xc7\x86;\xac\'\xc0\xa8\xab\xe3:\xce\xb2x7G\xa6?\xce1-M\xd2\xe2J\xa7\xe6\xf9\x95;\xab\xcfn\x14\xef\x03\xee\xbb\x15\xe3@\xea\xaeZ\xb2\n\xef\x0f\xce?\xcal\x16\x9d\xa4\xe8x\x15\x8eZ\xaceTA\xde\x93\xd9<\xc9\xdfY9nZv5C9\xf8\x00'/366, 0x0) ioctl$F2FS_IOC_RESIZE_FS(r0, 0x4008f510, &(0x7f0000000080)=0xfffffffffffffffb) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2c78ea5b5112f30000023fcbf84209132db954b414d2cc3b3901200080b6c83ad838127953cedfab76d200f1964a3347164895d0496f3eded772d45b80435470ad175ff259688bd66975b5d4d46bea2a34d00f477e2000000100f2462e"], 0x72) sendfile(r0, r0, &(0x7f0000001000), 0xffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$P9_RSTAT(r2, &(0x7f0000000200)={0x4b, 0x7d, 0x2, {0x0, 0x44, 0x101, 0x8, {0x40, 0x0, 0x5}, 0x80000000, 0x0, 0x80, 0x9, 0xc, 'cifs.spnego\x00', 0x1, '&', 0x3, '#&(', 0x1, '^'}}, 0x4b) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000009, 0x11, r0, 0x0) add_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 13:26:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x14, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a0001000000000000000000"], 0x40}}, 0x0) 13:26:51 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2d, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 348.014923][T11393] loop0: detected capacity change from 0 to 1024 [ 348.128676][T11393] EXT4-fs (loop0): Test dummy encryption mode enabled [ 348.215571][T11393] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 348.337742][T11393] EXT4-fs (loop0): orphan cleanup on readonly fs [ 348.344425][T11393] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 348.356465][T11393] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:26:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a00"], 0x40}}, 0x0) 13:26:52 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x15, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:52 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2e, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)) 13:26:52 executing program 4: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000), 0xfffffffffffffff, 0x0) [ 348.977499][T11409] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:26:52 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x16, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a0001000000000000000000"], 0x40}}, 0x0) [ 349.414097][T11418] loop0: detected capacity change from 0 to 1024 [ 349.464297][T11418] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 349.479788][T11418] EXT4-fs (loop0): orphan cleanup on readonly fs [ 349.486545][T11418] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 349.500850][T11418] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 13:26:53 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2f, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:53 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x7, 0x20, 0x40, 0x40, 0x0, 0xff09, 0x1, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x2, 0x788000000000000}, 0x4810, 0x3ff, 0x400, 0x3, 0x10001, 0xfffffffd, 0x200, 0x0, 0x5}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x20, 0x20, 0x9, 0x1, 0x0, 0x0, 0x10810, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x4, 0x3f}, 0x2a00, 0x3f, 0xfffffffa, 0x7, 0x10000, 0x2, 0x6, 0x0, 0x2, 0x0, 0x1f}, 0x0, 0xc, 0xffffffffffffffff, 0x1) socket$netlink(0x10, 0x3, 0x0) r1 = openat$vcsu(0xffffff9c, &(0x7f0000000280), 0x2880, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000200), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f0000000100)={0x0, 0x81, 0x0, 'queue1\x00'}) dup2(r3, r2) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="640000001000b4b0f0cb04daf8e470a51ce91d1465ff0407000000000038df0000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000300012800c0001006d6163766c616e00200002800a000400aaaaaaaaaaaa0000080001001000000008000300000000000a000500040000000000000008000a00", @ANYRES16=r2, @ANYRES64], 0x64}, 0x1, 0x0, 0x0, 0xc081}, 0x0) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x3f, 0x1, 0x3, 0xfc, 0x0, 0x8, 0x8101, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000240), 0x2}, 0x48, 0x73, 0x20, 0x6, 0x1, 0x3, 0x2, 0x0, 0xfffffffd, 0x0, 0x7fff}, 0xffffffffffffffff, 0x9, r0, 0x2) sendto$inet(0xffffffffffffffff, &(0x7f0000000100)="ca9605e7957f520547d7b6fc0d89c3dade47cff80cf2adef6468d1c0a3a4f3a3e7011d31781fbe2b5bea38084239021af13ac3088bc867c7f1e61216972f28f6afeaebc6973276ff", 0x48, 0x835f45eb5615b342, &(0x7f0000000180)={0x2, 0x4e22, @empty}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) 13:26:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)) 13:26:53 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x17, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a0001000000000000000000"], 0x40}}, 0x0) 13:26:53 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x30, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 350.451950][T11438] loop0: detected capacity change from 0 to 1024 [ 350.469772][T11438] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 350.553182][T11438] EXT4-fs (loop0): orphan cleanup on readonly fs [ 350.559694][T11438] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 350.571165][T11438] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 13:26:54 executing program 4: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f00000003c0)={0x7, @output}) r1 = syz_open_dev$video(&(0x7f0000000400), 0x5, 0x0) ioctl$VIDIOC_S_PARM(r1, 0xc0cc5616, &(0x7f00000004c0)={0xa, @raw_data="2b3c7e05845c577ed21d6868854f4b662e6d1afb5c94846e7d0f9edc508c95f63d1852690b1c9731594a02e3481a15928abccbfa839396b4a11336cd74b4d1e8f48b00d8b45c84b66891cbda06dc02334198e3155a3201e6e06d9abee742ad4d26677dd622646cc720bc8bf8eceee70f64a7b408a0ebab3407acdcef2b6450b32f9c069706072e89ee8024183013460cb1c48788ea4e45a087c056d32a738f9ac5abc167e74d19cfe94d76a8f90fcc6aa4126695ed9fb023f3a914f90f99b8f7611e44fba1c0685b"}) ioctl$VIDIOC_ENUMSTD(r1, 0xc0405619, &(0x7f0000000000)={0x5, 0x100000, "9194b24dcaef1c177e1b207e9c34fc1e47c7d3e197aaf988", {0x9, 0x2}, 0x800}) 13:26:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a0001000000000000000000"], 0x40}}, 0x0) 13:26:54 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x18, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)) 13:26:54 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x31, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:26:54 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x19, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 351.389028][T11457] loop0: detected capacity change from 0 to 1024 13:26:55 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0xaa401, 0x8) writev(r1, &(0x7f0000001380)=[{&(0x7f0000000140)="28f5bd39ecf2fc03cdc798876c8238cd43889f99ebd8ed76c3152655943e16f2881ecce918bfe70d72ff0759750cd1baab279330d1ce1e5f6d34ee88516f3f3ca18b6374a61a4420dd095fde3270b537b4c405e6508551b240f4a9c072891da29eeaa9ff459d6be29ad53b5e17d63b81fd41b91cc8a5ea1f31cf60c056b91f983bd741dcf56ac1c102bfde79555be8e8d029b4ea6a4e63ae9623fd4dd4781fd31fae8578d6fd4f401619c706b4f0b33c1756052fa78d9786220c6971561a8caab39fc51f8d391d1eddee0d09be940011973c23", 0xd3}, {&(0x7f0000000240)="793a1e908851a98ea3aa90cec1661ae6cf7dfe5f2dee965774a725d9f393329fa005f6c0f83caeca15e29567fed74669098730e9856bb2f9863f3a56ec86095f5f89fd633fd763a31dc8cc663044c562cca13833d6d2756a9a5db22d7249739037f548cb5378f47b81d65cfca6b0bae4b274b60eb5074d4169d788762e7efdfb6a451161c5924fb4cbedbbefd14d2e0c8545a88bc1a9e5027f74a9b17168a076354f2026e7e468c58233ecd756301e0f6c76de1e5b5587c87035768a8aa7ccd74bee7dbf9a0b808b4060485d372a92bff4cf9b2e778ee287c5e9c23cc50393f67ceb741238", 0xe5}, {&(0x7f0000000340)="d14ae710df3b853ffad737d2e1769d4c602a9339914cf3f764da13d461d985f82941004369614edc67e6a7276ddb82520eb0e3ab560b0319f79f51a7c83ff19fa5e664e984bfbfdacd4bd08600c44af6969ff1dc6afb32ad53459218aaee202ce7fd3fabbfad910f8bc9181ed4fe6fdbf0cba366a079db3966c29747dc6a15f08252dc025987f31930041bf21f4668ea82a83927582b7fb062ad44778f04bb751492cd45af1b70f9ff380da9e9321487810e765b88bc261b82495bcee155e7fbf50892759a89278883a74f28805df03a802e5b800828fe3d6edaabcca6acc5c60411c0d9fe31c210f728f8dc9dcd7c36c3f4244e4487afe37235c344efea17ff2a63d36c3b0ba1fed916c0b0714fe4080acf8ba02da7e0705e2ba797923730bde59b01d51587b7b5b96699f24db6356de1f96bb42dd4afb28bfe09a4754253a2252e5f69242c0852590eb818ae7c30a5dbbd3d69182b4c5760ef573af757ded7a04a3eb7fbf7344fcc3033a0216982203d7f3a6211ae930a49aa59a16f7d8d1385819a65cdba5faab76421c53572c18998a72bd0968c26931f26c4132fcd107dcd170f37ff9e9588389397cae341fe41b54ee8bacbb97ad083fc9b4c814cd6314f4e75a7a04e1ef2bdbb7c32a057c08259a83605be0e195f7ecc73a2a075d87210dd2b0131c20cb1b125e860d4f4ed2f9e8c88ef57fb2c2d56098abe6eec8147247ee4f69b729335291ac185eed4ec9774d31545d4dc81d64efa3da894d915673cf7a6e1d04cb74de63c4a02ed19ffa0f25b268b7ce15e03a3362634fece4275cd2957a2dec094a481262c813357c9188ce86a246db723843ece20f1277b0401efc3cd1ca59e6b472f97c138b195a43f013483d004efef9829df05947aa762ab623ec2a4c4608afaf0f1d2c67cf2cf9bc4692cf170d0d4574a080ce90427126770fd90b08f5666f4deefacc5d77ac4a71cbef37a33314ce9cdcbab42b8036de63ff5faa8685cc8069a9c1b6f4af128c7fdf3b415207b8784b45502599cb64842d436aa8f8cb228496399bf92e808605a1a4a05832cb0736e5ff59c77658f6a02c26cd2370ac8f52b6563b373f0837403569ada6db2c18e167e84e8a3dbd5d0e29f0649b0cefc64057e9d22bd05851496959777ae09cf8926289109f0aeb2e004b2b33524bc3ff2562b9b13c3017a05056af2789b2a8ea306d9456b1b6b4b57f47c6054a6300eb6fc9bfe7e91400b840fd07a63fac3860fc973d62e5470e15289da03099957bba4a8ffc3d2534bb01543a5cdf2f079741316f8fa954708cf94f5c923d2511e79232d660321ba6634ccee24ad67a9dcdcadc6e3362aa41cb65165f15b76ef726780181a016bcdab3a24ab657a570c56fb6712b0f33d8aedd705ad48985982d080263ee9d61a37cc5e3fe1ea0006411bb346477028acee60f9862d722a820522c238ab02f6bf80b964d01f51aa269df08599782801b034bfc6b5c351cb427abcd1b44bd1fbb689fa9c58298ad50b08bfe75be2d2f13fc332def82473c098a87116803a4b10f2dde59ce27f903aa38c20e96c485fb65982b083c229844fe9130ebdc4cc209bcb5af058e2cbc892a52982b2e405f7d8a7136b5673c006775c34477bd3f506bdd91b6e708145e5008e867bb6bf48df25f7d0218d26e36dfc70d1b00d18953d257bc89fd2e820de34483f0941fd61fc86f449366b36bbb1f2c90c484723dd5ea56fdb39c0f55399752c7bdf61ffaaf81f96e6740ee587e9271e1c6ce1f5570383b9b97cbd73c9177589c953a4d87147f6bf1e5fdec6afde7ab0969781a725371ded846825a0a2eb66a4b5366eab0576ad397883274a10144b528efab88b33154371fa26e88db3b706e162f6435668a0d354533f43de2c5f346498bbe831bf7c918427cc9239126f7944c559e485e030e888586c4f9ea4ec6272ae551615d2ab12294a06248618c45ebd9cd59cd44251093ea62fc13a81d111427325e7b862a21996ad997fec08587d266603d0a1fc8710ae88ce4f7434f81a254bc56d0cebe4f2e9f94b269290d6e5989a605414f2daa941e713f6c6658033da784ec03e99607b183455ba7a073614ed8d92571197b48df9dfbc8c4ad056a30f83378409ff6dca72e19689528a55dc18989080f7ee5198cac28911b33cedeac6a84277d23e7469b026532bccea5c45248c7345488b5b62c10a3bba8a92fe6256161cb786c506e17be4b2a8d3af8a6c57a98961ca3c2652ce5ed22b96d54b1088b2e31d823f3ebb0b20b17f24c82d6675804c0130a1e72880e42052bfab3df17e6688919087d7f06842bc3d6eef4f12006333ee8f3ed45b47e911bbe8d8e406d9796d8ae7a53e0793384388eac456dd1a025b81ca8a53e2ddc98b91a460c9f126987c840bec0c7aed9324b0cf056e9ca7463532b56ca13e75997d0d5017e0bff9a6582420358da603313ff5c18ef7255c5d2b32c53572088f848bc87a807e93493408664d17548da868503ed130d1e5298a39f6cce825649a946ebc6cbf87c5aec9a6a9153413cd616994723291703529cfea40d8cfc568b2e69289e77ddd26526cd49722a630ca3dfbcb310d23072add35771c617ee59cc8eff3972fbdd7a988c48a7fb9cebfe00b4b1c45f5ad4bd5d9dc56bc8eca35feda6afe772f0343ddfd0d01f32667bed5ade80ac1f5ab11e1a6b5d5339706351068ec69064e833ba2a1fb1bbf22a48245566ed19f6e9fdec569d0bdc3f38879925ad37b21b54af9bb76d6ea8c41461cd70aaa5cc4a414d90db77f7c01643cd595d25ae2c355bb68e14afc5c4b05617fcb887bbd042614759e5bcf422c67713fcb4d32f37a7793a03a998245e395684f08b5280477d0d3fea4f94c05a962d527021577b7c572c94af631eff746e1b0db0e5ee6bb014d42a51f5f0e1dba9bf0dd54b4755f5bd7b2c44bae788f28d9394bde9d07a00d911d92cbb4e4c4e52ed63429aafa87160163c616ae14b9811bcf49587e5e7845228499ef411944816d0a668aa3955dcf82e297117d1c5329fa0233e6252d96ca628c48686a71524a7e82ca80e0e8a39453f30e67f7c36c5cf99ee8b0f51b943db6d8f0924b2b5de6fc48f650a4299a6874b9af67774ded4003314485b20c52a0eae2b16f3bc2d71a2e296f9cbc2bfc1c6fe10557733f110d893b2c3dd78f9851b2a4ce68447eebeb89d9bdc7b59a36a6dc0b1b4f17c9592ad2a579d20490bbde3fcd70bb3cf4030f6ee94b2dd140b9a9d799c4253d76d010966f4f1596392786cae165f13c6621adb282ef50a7dbf40c192d019fc5b7333df02996e086f46b21eacfd821a9d9aa545e4b42da6228cf1b8d0fb1dbffbc4b11fd8263dc91fb385846d248f0a1e70b86694134e4eded1ae505a94a47b8e8c259b681d7c8f337078f61f317c1e0675d2cf9bf6be6cdb7b77d4840b29bd53e0874f1ae4c077bab19b0b85b1eec9d6fdfcedbdf3bb09fe8b2c3fa8e817956d6aa16b4bc29029cc16f8f15c08e8944ce097c0a39301eefb18481a32ebfaf7c3cb5fe82edfe1c85c6ecf2c781c2ac0d4972a913bf4b95294195e6d5ee466f645f3e0d8f0b1f13358739a545bbd0851fd58d4cb34b37d4a680b270293888e791278144558ac155d72e055ebdb1a77ba4ba78354c6b04227078fc7d4233c2b0ee98b1270f324e77cc65df1a208fcc5d6f07e49aaf2ff5e4137a6ee2b48a0971a3eebc40bdae54f70266a0a0ef8cb4ab280466ade62585795449c0ab2290c979df992eec37454f92caa8ee6727abc8a956d6a35e4993d68b3d5393df41263ec6396f903666449d09ed6ec4489bda0b667f9924364b25d8f70203c11b137f72cc0056f0fb9d2437b90e182ed548947ec3929b5818201b46cc97f990f172add10ca697f8037f3e1f554c867ce70deb972a20ce8734804c6ddf05285b40e5d6e9ba6f7aa56c47fb6f40b0bd7e4cbfc581919ac1463a56855bc33dcfefae5ef52348d20d15917ef7d0eae1f8209c52daa8c4a96941b06dc5267e80d44a743fc2091abab6c7027079a9dbb108caaf21109b062ed9843a00ccf90312020bbc253cdee327c931b63f2902fa74ce58aeb025464666a7fd2a2908db2638bb10783ab3b1f122f915fd1c363b1bb37cd08b8c888205e00147e16f2695f76ebeb40795294a8e6189149388e0745d80a9757dae1a47e79fe4c4ee82a81e0031bd8a52584cb60a23caaa22b9af026af23b5b08ee5c6f14b40cdd5a3cd10824a629fd337f92dc37ab55f40e99f8e33a049f88f1e58a6eb17303c3f1c3ea24ec0d0403c427c0876c69284378e3cd54e98b1fd8139c04c286294f48814c83ab0f29638179da413fd76844d7fbf77f88f884ac5f046eed7f6717db8920caaf15c09c657ac3cb128a24015e67c39e6ce2ab456dc611f6026e16642d5fdac1bc0ed31d47ef9f9e687f00666ce613461fe02e8a4ba75177f6c1feb9b415e40177fda87a263f81e6390cd76de8ec53b5eb5db3543d19cd29e12e56ab9a2e62692158ab94b0f912be4e38709e92285613bd9e615d4dd9d5966286ba954523c3c37dc488d7ef8b2908b88cead65c25819dd69f2067d25d79df0df8de0f8a7891473f2856b4b2e67e98b7d64fade2f8149f8c64d3cd959125de483c320d4fb33da26f84218e987eca172350a821043a293661f4115bd24d9f9f322706058d5f8e9dbbc556ec4d3bec920fd0c3dd1a4ae6a6833cba285738ca0d5804d273c05df8173e4c1ff1159ed1b13ff926fe10df095eea056146184c88af623caaf28893e8100c4ce7d4a0aeace8e0bdde900a9aa7d530fcbf919b93ae651ffa19c1ada73c99a2e31dfe79f906479a3f930bcf4594dbd262dea19ac3915c8efdb540af995a18db69de879eb2599033fce90d729d9edb12fc09b45f5f1a225a55674922cd29220cc1b064690afe117546ae83c7fc63ecc67738562f9d3b4f4efff392d3864f8a78fcd7dc774a982c90ff1ad8258795c7825bdbd2843d72061abdb750f4c3683a3583d291829d274e29d69ebb21e23c1e16cd04ca03152de55e0bef8de6f3bdd2546126cfe524a5ec563d4bd1b0af193da026b79148552949022484cfba7487b8aea8e3e3258bb85de98fb02767cef6f0fb7851be7a07835b20f16d29c202a2f482d712664add734836cfa6d3350076b664f5d707adb44bb0aa66e72dd98be62a8140262213156ef0a4f7625e99a89ebc219a68ca5d7e67f4c702576f95ef1043f193ff431b5e8fa3e6b3fe14a87337c7fb87af4c4db0a85cff4a60176c4d5e5aeae51950a3fefe83a15abbd330361348023a4bfb0cba81f5d373ff6298acfddbea6ff25f95b084755c256ddb7e273b3ae72b5115f64574795be7aab50687f1b61f2eef8bcb96fcc13f8b5b49794bd625d896e0206b573489d5e46be4dee4a6b9e29fa4f3562d1de67149e14bb26790937175c9f82d5e03b3e4354dd54a42f75865f6da6a77c6ede02051d166c8ce13131c827579744b6a009a1b9cffdba57066741c07e93d451ea7abc9137164ec3803e89432e4b3e97ca6703dd43432c49e327bbbe224429a465b816e430178c0316a673c687d5bdd22c6f5766a22bb91bfdc09418c7d682f30a7eded00684e9e4dfa4953d91790a30ef2e090a687a890834313e25c4ffbfa988819ddda6bb114238f57a977b5e452641d7dbb1b687a6cd0b52c2038c5f412021c35677fcea82d88d03ec8108d23270d127212661c74d84017a4c6b3efc74fd5a87644f41d52a56204b329e24eebe6b95616a6d47e17a26ee2e688fb492a6969a9cf", 0x1000}, {&(0x7f0000001340)="e042d16c311bf5d490927d6be564dcb5d201f2099049514043c58a94b2ff0d725ddf097ab341c95fa8eacd089dd7a1c62a3009", 0x33}], 0x4) socket$netlink(0x10, 0x3, 0x13) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r2 = gettid() clone(0x3102002dfe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000000c0), 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x200044) wait4(0x0, 0x0, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000100)=""/231) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f00000000c0)=0x100) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, 0x0, 0x106, 0x5}}, 0x20) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x800, 0xce) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000001480)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000001440)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f00000014c0)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000001400), r4, 0x0, 0x2, 0x4}}, 0x20) ioctl$SNDCTL_DSP_SYNC(r0, 0x5001, 0x0) [ 351.443582][T11461] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 351.478962][T11457] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 351.606926][T11457] EXT4-fs (loop0): orphan cleanup on readonly fs [ 351.614017][T11457] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 351.625531][T11457] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 13:26:55 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x32, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a0001000000000000000000"], 0x40}}, 0x0) 13:26:56 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1a, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:56 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x33, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:56 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:26:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a0001000000000000000000"], 0x40}}, 0x0) [ 352.841401][T11485] FAULT_INJECTION: forcing a failure. [ 352.841401][T11485] name failslab, interval 1, probability 0, space 0, times 1 [ 352.854624][T11485] CPU: 1 PID: 11485 Comm: syz-executor.0 Not tainted 5.12.0-rc6-syzkaller #0 [ 352.863576][T11485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.864223][T11485] Call Trace: [ 352.864223][T11485] dump_stack+0x24c/0x2e0 [ 352.864223][T11485] should_fail+0x8bd/0x9e0 [ 352.864223][T11485] __should_failslab+0x1f1/0x290 [ 352.864223][T11485] should_failslab+0x29/0x70 [ 352.864223][T11485] __kmalloc+0xbd/0x550 [ 352.864223][T11485] ? __se_sys_memfd_create+0x316/0xbb0 [ 352.864223][T11485] __se_sys_memfd_create+0x316/0xbb0 [ 352.864223][T11485] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 352.864223][T11485] ? syscall_enter_from_user_mode_work+0x56/0x100 [ 352.864223][T11485] __ia32_sys_memfd_create+0x3e/0x60 [ 352.864223][T11485] __do_fast_syscall_32+0x127/0x180 [ 352.864223][T11485] do_fast_syscall_32+0x6a/0xc0 [ 352.864223][T11485] do_SYSENTER_32+0x73/0x90 [ 352.864223][T11485] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 352.864223][T11485] RIP: 0023:0xf7f31549 [ 352.864223][T11485] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 352.864223][T11485] RSP: 002b:00000000f552b40c EFLAGS: 00000296 ORIG_RAX: 0000000000000164 [ 352.864223][T11485] RAX: ffffffffffffffda RBX: 00000000080ea11d RCX: 0000000000000000 13:26:56 executing program 4: open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000def4655fdef4655f0100ffff53ef010001000000def4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c000000000000000000000004", 0x15, 0x560}, {&(0x7f0000010300)="0300000004", 0x5, 0x640}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000011d00)="2719c0d901000000803a0900803a09000000000006", 0x15, 0x8000}, {&(0x7f0000012e00)="ed41000000080000def4655fdef4655fdef4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000def4655fdef4655fdef4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}, {&(0x7f0000013000)="8081000000180000def4655fdef4655fdef4655f00000000000001000c00000010000800000000000af302000400000000000000000000000200000010000000020000000100000013", 0x49, 0x11180}], 0x0, &(0x7f0000013c00)) r0 = syz_mount_image$omfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x1, 0x6, &(0x7f0000000480)=[{&(0x7f0000000140)="9f", 0x1, 0x3}, {&(0x7f0000000180)="6bb0004deacd7a864de96a5bb0d27a04b52aeb701d32840704ac5f3d1dcee600dfde1ebbdc247a8b851407d99152405add0e3bd935e15e4885b73fe57b5db413f94e9529a8a3cd95f6a4ac0d93f8211b120055e1df770f7f4f4a256f78421db6a2", 0x61}, {&(0x7f0000000280)="381c519bc795e70861f5b52f022e0790750d0cba08319059c7dba46735349ec4f2674b0499516c05cc8914956288c494d97314d527f3a679766119f5d7", 0x3d, 0x2}, {&(0x7f00000002c0)="1aabcd7baea3f47b6504406d0d71ab5c8195bb96a02651c2a31c0e2ca44aa12bb1330283742802a7e138fc2867ed19387f7e01d646d0", 0x36}, {&(0x7f0000000300)="7503f4b61ff425b30cb4bacd3d559dd0f9a5ac836cf8cf9f12efb31efba20dfb37f8c5b2cc420d758e4057f661825ed8b106e716cc3af57185e0179155f8791a06c894a49c9d8f2d68ae5c84ecb19eb392277aecf76fb5331d26e0a0e8d126985b60b52a707a07b85c5348528af2b87caffbc3b4687739bd80e33c6adac13ae9b8f4f4f2df76fdf874f503c01cacfdcfb5883600a34aba0953fe4679546f4a5500a1beb915a4ee38d05557a9fe9347afc06fe9dc3b189635d6d1ab847780da307307eb0efe", 0xc5, 0x1}, {&(0x7f0000000400)="44a9752045d271a4329c6d305a89c81b49c6e3448f17901b9fe2a165abf5f047889888922131ee317784ed0814f200c7053ca3f970de1e4ff288c78b4c8c34e2953e50c69c50cde25f1645dc851686614aa1bc3e6633e74880eee5fa299d0805a654a67ae8c6be81", 0x68, 0x10000}], 0x20000, &(0x7f0000000500)={[{'&{'}, {'ext4\x00'}, {'$\\'}, {'\x9a-:{('}, {}, {'@(\xe5'}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@euid_lt={'euid<', 0xee01}}, {@hash}]}) mkdirat(r0, &(0x7f0000000580)='./file0\x00', 0x100) [ 352.864223][T11485] RDX: 00000000f552b46c RSI: 0000000000000004 RDI: 0000000000000004 [ 352.864223][T11485] RBP: 0000000020000180 R08: 0000000000000000 R09: 0000000000000000 [ 352.864223][T11485] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 352.864223][T11485] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 13:26:56 executing program 0 (fault-call:0 fault-nth:1): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:26:56 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1b, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 353.535640][T11495] loop4: detected capacity change from 0 to 512 [ 353.567169][T11499] FAULT_INJECTION: forcing a failure. [ 353.567169][T11499] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 353.580708][T11499] CPU: 0 PID: 11499 Comm: syz-executor.0 Not tainted 5.12.0-rc6-syzkaller #0 [ 353.589633][T11499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.596111][T11499] Call Trace: [ 353.596111][T11499] dump_stack+0x24c/0x2e0 [ 353.596111][T11499] should_fail+0x8bd/0x9e0 [ 353.596111][T11499] should_fail_usercopy+0x39/0x40 [ 353.596111][T11499] _copy_from_user+0x63/0x300 [ 353.622375][T11499] __se_sys_memfd_create+0x3b4/0xbb0 [ 353.622375][T11499] ? syscall_enter_from_user_mode_work+0x56/0x100 [ 353.622375][T11499] __ia32_sys_memfd_create+0x3e/0x60 [ 353.622375][T11499] __do_fast_syscall_32+0x127/0x180 [ 353.622375][T11499] do_fast_syscall_32+0x6a/0xc0 [ 353.622375][T11499] do_SYSENTER_32+0x73/0x90 [ 353.652194][T11499] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 353.652194][T11499] RIP: 0023:0xf7f31549 [ 353.652194][T11499] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 353.682301][T11499] RSP: 002b:00000000f552b40c EFLAGS: 00000296 ORIG_RAX: 0000000000000164 [ 353.682301][T11499] RAX: ffffffffffffffda RBX: 00000000080ea11d RCX: 0000000000000000 [ 353.682301][T11499] RDX: 00000000f552b46c RSI: 0000000000000004 RDI: 0000000000000004 [ 353.682301][T11499] RBP: 0000000020000180 R08: 0000000000000000 R09: 0000000000000000 [ 353.712338][T11499] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 353.712338][T11499] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 13:26:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a0001000000000000000000"], 0x40}}, 0x0) 13:26:57 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x35, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 353.926108][T11495] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 353.937626][T11495] ext4 filesystem being mounted at /root/syzkaller-testdir564003648/syzkaller.uG50ON/22/file0 supports timestamps until 2038 (0x7fffffff) [ 354.042673][T11494] loop4: detected capacity change from 0 to 512 13:26:57 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1c, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 354.104085][T11494] EXT4-fs warning (device loop4): ext4_multi_mount_protect:386: Unable to create kmmpd thread for loop4. 13:26:57 executing program 0 (fault-call:0 fault-nth:2): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:26:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) r4 = openat(0xffffffffffffffff, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r1}}}}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x40}}, 0x0) socket(0x27, 0x80803, 0x4) close(r1) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(0xffffffffffffffff, 0x8040942d, &(0x7f0000000080)) 13:26:58 executing program 2 (fault-call:2 fault-nth:0): r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:26:58 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1d, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:58 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x36, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 354.837882][T11518] FAULT_INJECTION: forcing a failure. [ 354.837882][T11518] name failslab, interval 1, probability 0, space 0, times 0 [ 354.850877][T11518] CPU: 1 PID: 11518 Comm: syz-executor.0 Not tainted 5.12.0-rc6-syzkaller #0 [ 354.859789][T11518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.860699][T11518] Call Trace: [ 354.860699][T11518] dump_stack+0x24c/0x2e0 [ 354.860699][T11518] should_fail+0x8bd/0x9e0 [ 354.860699][T11518] __should_failslab+0x1f1/0x290 [ 354.860699][T11518] should_failslab+0x29/0x70 [ 354.860699][T11518] kmem_cache_alloc+0xf6/0x1030 [ 354.860699][T11518] ? kmsan_get_shadow_origin_ptr+0x29/0xb0 [ 354.860699][T11518] ? shmem_alloc_inode+0x54/0xb0 [ 354.860699][T11518] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 354.860699][T11518] ? stack_trace_save+0x123/0x1a0 [ 354.860699][T11518] shmem_alloc_inode+0x54/0xb0 [ 354.860699][T11518] ? shmem_match+0x230/0x230 [ 354.860699][T11518] new_inode_pseudo+0xa7/0x580 [ 354.860699][T11518] new_inode+0x5a/0x3d0 [ 354.860699][T11518] ? __msan_poison_alloca+0xec/0x110 [ 354.860699][T11518] shmem_get_inode+0x1f1/0xe30 [ 354.860699][T11518] __shmem_file_setup+0x312/0x670 [ 354.860699][T11518] shmem_file_setup+0xc6/0xe0 [ 354.860699][T11518] __se_sys_memfd_create+0x59a/0xbb0 [ 354.860699][T11518] ? syscall_enter_from_user_mode_work+0x56/0x100 [ 354.860699][T11518] __ia32_sys_memfd_create+0x3e/0x60 [ 354.860699][T11518] __do_fast_syscall_32+0x127/0x180 [ 354.860699][T11518] do_fast_syscall_32+0x6a/0xc0 [ 354.860699][T11518] do_SYSENTER_32+0x73/0x90 [ 354.860699][T11518] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 354.860699][T11518] RIP: 0023:0xf7f31549 [ 354.860699][T11518] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 [ 354.860699][T11518] RSP: 002b:00000000f552b40c EFLAGS: 00000296 ORIG_RAX: 0000000000000164 [ 354.860699][T11518] RAX: ffffffffffffffda RBX: 00000000080ea11d RCX: 0000000000000000 [ 354.860699][T11518] RDX: 00000000f552b46c RSI: 0000000000000004 RDI: 0000000000000004 [ 354.860699][T11518] RBP: 0000000020000180 R08: 0000000000000000 R09: 0000000000000000 [ 354.860699][T11518] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 354.860699][T11518] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 355.654765][T11536] FAULT_INJECTION: forcing a failure. [ 355.654765][T11536] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 355.668484][T11536] CPU: 1 PID: 11536 Comm: syz-executor.2 Not tainted 5.12.0-rc6-syzkaller #0 [ 355.677415][T11536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 355.678240][T11536] Call Trace: [ 355.678240][T11536] dump_stack+0x24c/0x2e0 [ 355.678240][T11536] should_fail+0x8bd/0x9e0 [ 355.678240][T11536] should_fail_usercopy+0x39/0x40 [ 355.678240][T11536] _copy_from_user+0x63/0x300 [ 355.678240][T11536] __get_compat_msghdr+0x106/0x9d0 [ 355.678240][T11536] ? kmsan_get_metadata+0x116/0x180 [ 355.678240][T11536] ? kmsan_internal_set_origin+0x85/0xc0 [ 355.678240][T11536] ? rcu_read_unlock_strict+0x9/0x10 [ 355.678240][T11536] get_compat_msghdr+0x108/0x2b0 [ 355.678240][T11536] __sys_sendmsg+0x4ac/0x830 [ 355.678240][T11536] ? kmsan_get_metadata+0x116/0x180 [ 355.678240][T11536] ? kmsan_get_metadata+0x116/0x180 [ 355.678240][T11536] ? kmsan_internal_set_origin+0x85/0xc0 [ 355.678240][T11536] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 355.678240][T11536] ? __msan_instrument_asm_store+0x107/0x130 [ 355.678240][T11536] ? fput+0x82/0x320 [ 355.678240][T11536] ? kmsan_get_metadata+0x116/0x180 [ 355.678240][T11536] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 355.678240][T11536] ? kmsan_get_metadata+0x116/0x180 [ 355.678240][T11536] ? kmsan_get_metadata+0x116/0x180 [ 355.678240][T11536] __se_compat_sys_sendmsg+0xa7/0xc0 [ 355.678240][T11536] __ia32_compat_sys_sendmsg+0x4a/0x70 [ 355.678240][T11536] __do_fast_syscall_32+0x127/0x180 [ 355.678240][T11536] do_fast_syscall_32+0x6a/0xc0 [ 355.678240][T11536] do_SYSENTER_32+0x73/0x90 [ 355.678240][T11536] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 355.678240][T11536] RIP: 0023:0xf7fae549 [ 355.678240][T11536] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 13:26:59 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x37, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:26:59 executing program 0 (fault-call:0 fault-nth:3): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 355.678240][T11536] RSP: 002b:00000000f55a85fc EFLAGS: 00000296 ORIG_RAX: 0000000000000172 [ 355.678240][T11536] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000200000c0 [ 355.678240][T11536] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 355.678240][T11536] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 355.678240][T11536] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 355.678240][T11536] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 13:26:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c000000040601080007000000000000000000000500010007"], 0x2c}}, 0x0) 13:26:59 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1e, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 356.379893][T11542] FAULT_INJECTION: forcing a failure. [ 356.379893][T11542] name failslab, interval 1, probability 0, space 0, times 0 [ 356.392903][T11542] CPU: 0 PID: 11542 Comm: syz-executor.0 Not tainted 5.12.0-rc6-syzkaller #0 [ 356.401829][T11542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.402766][T11542] Call Trace: [ 356.402766][T11542] dump_stack+0x24c/0x2e0 [ 356.402766][T11542] should_fail+0x8bd/0x9e0 [ 356.402766][T11542] __should_failslab+0x1f1/0x290 [ 356.402766][T11542] should_failslab+0x29/0x70 [ 356.402766][T11542] kmem_cache_alloc+0xf6/0x1030 [ 356.402766][T11542] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 356.402766][T11542] ? __d_alloc+0x8a/0xc90 [ 356.402766][T11542] ? __msan_memset+0x7e/0xb0 [ 356.402766][T11542] ? mpol_shared_policy_init+0x6e9/0xe10 [ 356.402766][T11542] __d_alloc+0x8a/0xc90 [ 356.402766][T11542] ? kmsan_get_shadow_origin_ptr+0x84/0xb0 [ 356.465964][T11542] ? kmsan_get_metadata+0x116/0x180 [ 356.465964][T11542] ? kmsan_internal_set_origin+0x85/0xc0 [ 356.465964][T11542] d_alloc_pseudo+0x68/0x130 [ 356.465964][T11542] alloc_file_pseudo+0x19f/0x4e0 [ 356.465964][T11542] ? clear_nlink+0xdc/0x150 [ 356.465964][T11542] __shmem_file_setup+0x483/0x670 [ 356.465964][T11542] shmem_file_setup+0xc6/0xe0 [ 356.465964][T11542] __se_sys_memfd_create+0x59a/0xbb0 [ 356.509637][T11544] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 356.465964][T11542] ? syscall_enter_from_user_mode_work+0x56/0x100 [ 356.465964][T11542] __ia32_sys_memfd_create+0x3e/0x60 [ 356.465964][T11542] __do_fast_syscall_32+0x127/0x180 [ 356.532098][T11542] do_fast_syscall_32+0x6a/0xc0 [ 356.532098][T11542] do_SYSENTER_32+0x73/0x90 [ 356.532098][T11542] entry_SYSENTER_compat_after_hwframe+0x4d/0x5c [ 356.532098][T11542] RIP: 0023:0xf7f31549 [ 356.532098][T11542] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01 10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d b4 26 00 00 00 00 8d b4 26 00 00 00 00 13:27:00 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x38, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 356.532098][T11542] RSP: 002b:00000000f552b40c EFLAGS: 00000296 ORIG_RAX: 0000000000000164 [ 356.532098][T11542] RAX: ffffffffffffffda RBX: 00000000080ea11d RCX: 0000000000000000 [ 356.532098][T11542] RDX: 00000000f552b46c RSI: 0000000000000004 RDI: 0000000000000004 [ 356.532098][T11542] RBP: 0000000020000180 R08: 0000000000000000 R09: 0000000000000000 [ 356.532098][T11542] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 356.532098][T11542] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 13:27:00 executing program 5: ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f00000000c0)={0x17, 0x86, &(0x7f0000000000)="f6d4ff1c5499bdc050e4f9efaa78eb388cdcf9bde92b9408f60d917ac65997c47766ddd47bf6a16034ef2a81f18661a0482fc1924db681f8c669bb11d6dc77bf3068642336b5a8d44fac48b4380d64129b404ca016e88c4efa98d72062cdc82ac02c0ce2e4449783012993280d81d775d6cf6c89bee6cea4bfe9d08460fb46121d73cccd09db"}) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000100)=""/197) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000200)=""/195) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f512, &(0x7f0000000300)) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000340)=""/77) r0 = openat$userio(0xffffff9c, &(0x7f00000003c0), 0x400102, 0x0) writev(r0, &(0x7f0000001680)=[{&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000001400)="254e1eb1e0d93cba3f4fcfb42ff41c582675037013c45112f87cae284a48db712a4b48b1366d08649c37da56bea2536a061b4ece2caed17562bb8926be6c596360dc920ad1afc31325a1b34d1761d40d1c43db2a792174439f5a7c528258337afba8ac3968dbc9507f63577c9d7df5b864745264282c5a2ed35ac0e3cf6537de4458113244c853e72f054965a3b49fc8384bef461111f774bd6a4421d7498bed94dc03871721bd8271836915866190f1f4ca8647f64a6a21ca1c33c97876fbe1effda1a57c16f1137f7ae02cb8be4aa2c4449baf0a39f0943202d0200bd60776cc0f02cfdb7b8040ee5f6ed00a3728a010e6de980deadb93", 0xf8}, {&(0x7f0000001500)="4358a602b6e85e980bb38a69387ade3a6290605f540bdc25e8946a9972be4bc2ec3bc36172d8bb05f349375325fb9fd1300aa3e0792fd6caf591d4e6d8af81628e11ae8a12a4b0c85cf8abf9056d0a7571f90874f82c9c69c9c27c3f6ca6800c829b3236d0f7078310ab7b2fc1f2f193e2ec94239ea812883ffad773f611676e1b5e2acc3a48a0352fd5ff39187553b7a895a8eae308b0a08463ab775612b167d67627c24e4473f17391470484a2f3d58ff81d81d033b4ac58c4f12f5f393bbb72f752deb6f9c84a5b3057e7515f6e8659765555611f17895c4f4c8725b540224df4b72ecaa933427fcb44", 0xeb}, {&(0x7f0000001600)="add8599e389a38221f330bf2dd33cb731c68ddddc02ebffb920de1be129e68af80bb5cfc45595b52c78396cd7fd76c9f960545a7b073e734701bc8e5fa4d9c3ba8d4e6e3c80005abcae04b3577b104c19c528762adbe02496df86b8c834247b5808ec51fb334", 0x66}], 0x4) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f00000016c0)=0x800) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000001700)='./file0\x00', 0x100) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000001780)={0x1f, 0x3e, &(0x7f0000001740)="a019de2bc8054ee9f0c3bead023b102debbe2dbdb294d256966f61dea6759bd3fe7a7614ee0b4bc09abb713327be9cf8c6fe7f384b34de911f9d6b95068a"}) recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{&(0x7f00000017c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000001840)=""/195, 0xc3}, {&(0x7f0000001940)=""/88, 0x58}, {&(0x7f00000019c0)=""/10, 0xa}], 0x3, &(0x7f0000001a40)=""/44, 0x2c}, 0x8}, {{&(0x7f0000001a80)=@generic, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001b00)=""/48, 0x30}], 0x1, &(0x7f0000001b80)=""/163, 0xa3}}, {{&(0x7f0000001c40)=@isdn, 0x80, &(0x7f0000002fc0)=[{&(0x7f0000001cc0)=""/152, 0x98}, {&(0x7f0000001d80)=""/4096, 0x1000}, {&(0x7f0000002d80)=""/152, 0x98}, {&(0x7f0000002e40)=""/206, 0xce}, {&(0x7f0000002f40)=""/42, 0x2a}, {&(0x7f0000002f80)=""/21, 0x15}], 0x6, &(0x7f0000003000)=""/44, 0x2c}, 0x4}, {{&(0x7f0000003040)=@l2tp={0x2, 0x0, @remote}, 0x80, &(0x7f0000004240)=[{&(0x7f00000030c0)=""/129, 0x81}, {&(0x7f0000003180)=""/43, 0x2b}, {&(0x7f00000031c0)=""/105, 0x69}, {&(0x7f0000003240)=""/4096, 0x1000}], 0x4, &(0x7f0000004280)=""/38, 0x26}, 0x7}, {{0x0, 0x0, &(0x7f0000004600)=[{&(0x7f00000042c0)=""/230, 0xe6}, {&(0x7f00000043c0)=""/189, 0xbd}, {&(0x7f0000004480)=""/83, 0x53}, {&(0x7f0000004500)=""/207, 0xcf}], 0x4, &(0x7f0000004640)=""/214, 0xd6}, 0x1}, {{&(0x7f0000004740)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000004880)=[{&(0x7f00000047c0)=""/153, 0x99}], 0x1, &(0x7f00000048c0)=""/183, 0xb7}, 0x3f}, {{&(0x7f0000004980)=@tipc=@id, 0x80, &(0x7f0000004e00)=[{&(0x7f0000004a00)=""/104, 0x68}, {&(0x7f0000004a80)=""/104, 0x68}, {&(0x7f0000004b00)=""/231, 0xe7}, {&(0x7f0000004c00)=""/105, 0x69}, {&(0x7f0000004c80)=""/3, 0x3}, {&(0x7f0000004cc0)=""/52, 0x34}, {&(0x7f0000004d00)=""/224, 0xe0}], 0x7, &(0x7f0000004e40)=""/203, 0xcb}, 0x1}, {{&(0x7f0000004f40)=@tipc=@id, 0x80, &(0x7f0000005140)=[{&(0x7f0000004fc0)=""/202, 0xca}, {&(0x7f00000050c0)=""/112, 0x70}], 0x2}, 0x2}, {{&(0x7f0000005180)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000005200)=""/16, 0x10}], 0x1, &(0x7f0000005280)=""/12, 0xc}, 0x9}], 0x9, 0x12120, 0x0) r3 = syz_mount_image$romfs(&(0x7f0000005400), &(0x7f0000005440)='./file0\x00', 0x80000001, 0x1, &(0x7f0000005500)=[{&(0x7f0000005480)="0132eb0bca408e0120e7eca885541732ac1683bb2753e45f7b0273c1a3fa0e63c8e7fdaa903c4a5ab4ad799cfa476792d61decc3e2c4db070c0b9a94475c8bce3ac7ce25fa58e2c27e6c3c5b0f99e10b5029411d23aaebd4dd095b127a93d70a3cc089285a4660e250bb4d34e4489708cdb6", 0x72, 0x9a36}], 0x0, &(0x7f0000005540)={[{'.'}, {'/dev/userio\x00'}], [{@uid_gt={'uid>', 0xee00}}, {@obj_user={'obj_user', 0x3d, '/dev/userio\x00'}}]}) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000005580)) getsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f00000055c0)=""/118, &(0x7f0000005640)=0x76) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000005680)={{{@in=@private, @in6=@private2}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000005780)=0xe4) fcntl$addseals(r2, 0x409, 0x4) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f00000057c0)=0x4) r4 = openat$procfs(0xffffff9c, &(0x7f0000005800)='/proc/zoneinfo\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r4, 0x40284504, &(0x7f0000005840)={0x2, 0x11, 0x8, 0x99c, "60265eac054674ee061eaf502cfaf15ab43151c0cdea28b8b340d55f6ac8178e"}) write$USERIO_CMD_REGISTER(r0, &(0x7f0000005880)={0x0, 0x80}, 0x2) 13:27:00 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) chown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 13:27:00 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x21, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:01 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x39, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:27:01 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3a, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:01 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xaa, 0xc5, 0x1d, 0x20, 0x2770, 0x9052, 0xcb32, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x54, 0x7d, 0xbd}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000400)={0x34, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0}) [ 357.996636][T11562] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:27:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:27:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:27:01 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3b, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 358.332405][ T4672] Bluetooth: hci1: command 0x0406 tx timeout [ 358.452327][ T961] usb 5-1: new high-speed USB device number 2 using dummy_hcd 13:27:02 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x22, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 358.618164][T11571] loop0: detected capacity change from 0 to 1024 [ 358.657429][T11571] EXT4-fs (loop0): Test dummy encryption mode enabled [ 358.666469][T11571] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 358.683429][T11571] EXT4-fs (loop0): orphan cleanup on readonly fs [ 358.690008][T11571] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 358.702432][ T961] usb 5-1: Using ep0 maxpacket: 32 [ 358.703605][T11571] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 358.822976][ T961] usb 5-1: New USB device found, idVendor=2770, idProduct=9052, bcdDevice=cb.32 [ 358.832570][ T961] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 358.876434][ T961] usb 5-1: config 0 descriptor?? [ 358.918880][ T961] gspca_main: sq905c-2.14.0 probing 2770:9052 [ 358.939234][T11581] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 359.002763][T11583] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:27:02 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x23, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 359.582435][ T961] gspca_sq905c: sq905c_command: usb_control_msg failed (-71) [ 359.590477][ T961] sq905c: probe of 5-1:0.0 failed with error -71 [ 359.641431][ T961] usb 5-1: USB disconnect, device number 2 [ 360.363462][ T8475] usb 5-1: new high-speed USB device number 3 using dummy_hcd [ 360.604433][ T8475] usb 5-1: Using ep0 maxpacket: 32 [ 360.743933][ T8475] usb 5-1: New USB device found, idVendor=2770, idProduct=9052, bcdDevice=cb.32 [ 360.753284][ T8475] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 360.870709][ T8475] usb 5-1: config 0 descriptor?? [ 360.923597][ T8475] gspca_main: sq905c-2.14.0 probing 2770:9052 [ 361.163262][T11594] IPVS: ftp: loaded support on port[0] = 21 [ 361.322474][ T8475] gspca_sq905c: sq905c_command: usb_control_msg failed (-71) [ 361.329944][ T8475] sq905c 5-1:0.0: Get version command failed [ 361.336621][ T8475] sq905c: probe of 5-1:0.0 failed with error -71 [ 361.492554][ T8475] usb 5-1: USB disconnect, device number 3 [ 362.100248][T11594] chnl_net:caif_netlink_parms(): no params data found [ 362.629404][T11594] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.637163][T11594] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.647297][T11594] device bridge_slave_0 entered promiscuous mode [ 362.748703][T11594] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.756599][T11594] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.766534][T11594] device bridge_slave_1 entered promiscuous mode [ 362.944528][T11594] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 362.972697][ T961] Bluetooth: hci5: command 0x0409 tx timeout [ 363.026142][T11594] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 363.157735][T11594] team0: Port device team_slave_0 added [ 363.191668][T11594] team0: Port device team_slave_1 added [ 363.281563][T11594] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 363.288897][T11594] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 363.315691][T11594] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 363.390188][T11594] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 363.397710][T11594] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 363.424034][T11594] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 363.522894][T11594] device hsr_slave_0 entered promiscuous mode [ 363.558208][T11594] device hsr_slave_1 entered promiscuous mode [ 363.602569][T11594] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 363.610253][T11594] Cannot create hsr debugfs directory [ 364.155375][T11594] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 364.210768][T11594] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 364.259586][T11594] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 364.328298][T11594] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 364.876322][T11594] 8021q: adding VLAN 0 to HW filter on device bond0 [ 364.915776][ T8475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 364.925206][ T8475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 364.949937][T11594] 8021q: adding VLAN 0 to HW filter on device team0 [ 364.986626][ T8475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 364.997477][ T8475] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 365.007015][ T8475] bridge0: port 1(bridge_slave_0) entered blocking state [ 365.014452][ T8475] bridge0: port 1(bridge_slave_0) entered forwarding state [ 365.052717][ T2950] Bluetooth: hci5: command 0x041b tx timeout [ 365.078801][ T8475] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 365.088417][ T8475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 365.098666][ T8475] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 365.108388][ T8475] bridge0: port 2(bridge_slave_1) entered blocking state [ 365.115833][ T8475] bridge0: port 2(bridge_slave_1) entered forwarding state [ 365.126310][ T8475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 365.137429][ T8475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 365.210779][T11594] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 365.223666][T11594] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 365.248069][ T8475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 365.258647][ T8475] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 365.269659][ T8475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 365.280376][ T8475] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 365.290898][ T8475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 365.300696][ T8475] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 365.311317][ T8475] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 365.321203][ T8475] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 365.334234][ T8475] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 365.344873][ T8475] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 365.429344][ T8943] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 365.437785][ T8943] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 365.485178][T11594] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 365.743295][ T8943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 365.755425][ T8943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 365.849998][ T8943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 365.860915][ T8943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 365.891769][T11594] device veth0_vlan entered promiscuous mode [ 365.901871][ T8475] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 365.911189][ T8475] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 365.961824][T11594] device veth1_vlan entered promiscuous mode [ 366.046967][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 366.056907][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 366.066563][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 366.076901][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 366.105684][T11594] device veth0_macvtap entered promiscuous mode [ 366.128518][T11594] device veth1_macvtap entered promiscuous mode [ 366.213090][T11594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 366.223879][T11594] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 366.234280][T11594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 366.245225][T11594] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 366.255408][T11594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 366.266329][T11594] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 366.276481][T11594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 366.287259][T11594] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 366.303792][T11594] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 366.318227][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 366.328086][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 366.337922][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 366.348123][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 366.377723][T11594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 366.389476][T11594] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 366.399731][T11594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 366.410483][T11594] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 366.420644][T11594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 366.431366][T11594] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 366.441478][T11594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 366.452196][T11594] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 366.466158][T11594] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 366.478091][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 366.488442][ T2950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 366.527319][T11594] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 366.536605][T11594] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 366.547090][T11594] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 366.556126][T11594] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 366.948373][ T384] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 366.956508][ T384] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 366.999656][ T4672] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 367.083291][ T375] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 367.091247][ T375] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 367.101282][ T1981] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 367.134585][ T4672] Bluetooth: hci5: command 0x040f tx timeout [ 367.302642][T11848] loop5: detected capacity change from 0 to 264192 [ 367.323824][T11848] romfs: Unknown parameter '.' 13:27:11 executing program 5: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc0205647, &(0x7f0000000040)={0xf010000, 0x0, 0x4, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "41fb2b60"}, 0x0, 0x0, @userptr}) 13:27:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80002, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:27:11 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3c, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:27:11 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2a, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:11 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xaa, 0xc5, 0x1d, 0x20, 0x2770, 0x9052, 0xcb32, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x54, 0x7d, 0xbd}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000400)={0x34, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0}) [ 367.728849][T11864] loop0: detected capacity change from 0 to 1024 [ 367.752856][T11864] EXT4-fs (loop0): Test dummy encryption mode enabled [ 367.760541][T11864] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 367.768746][T11867] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 367.778203][T11864] EXT4-fs (loop0): orphan cleanup on readonly fs [ 367.786725][T11864] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 367.798109][T11864] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:27:11 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3e, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 367.897520][T11870] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:27:11 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2b, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 367.982842][ T9626] usb 5-1: new high-speed USB device number 4 using dummy_hcd 13:27:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:27:11 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80003, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 368.232756][ T9626] usb 5-1: Using ep0 maxpacket: 32 [ 368.352421][ T9626] usb 5-1: New USB device found, idVendor=2770, idProduct=9052, bcdDevice=cb.32 [ 368.361666][ T9626] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 368.460180][ T9626] usb 5-1: config 0 descriptor?? 13:27:12 executing program 5: unshare(0x400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r0, 0x0, &(0x7f00000001c0)) [ 368.555067][ T9626] gspca_main: sq905c-2.14.0 probing 2770:9052 13:27:12 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x41, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 368.694320][T11883] loop0: detected capacity change from 0 to 1024 [ 368.727514][T11883] EXT4-fs (loop0): Test dummy encryption mode enabled [ 368.728013][T11885] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:27:12 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2c, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 368.747900][T11883] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 368.766649][T11883] EXT4-fs (loop0): orphan cleanup on readonly fs [ 368.773471][T11883] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 368.785004][T11883] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 368.901870][T11889] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:27:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000180)=0xffff, 0x4) recvmmsg(r1, &(0x7f0000001140)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff87}}], 0x700, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0xf0e8}, {0x8000, 0x9, 0x3, 0x8}, {0x1}, {0x5, 0x46, 0xfc, 0x80000001}, {0x8, 0x0, 0xfa}]}, 0x10) write$binfmt_misc(r0, &(0x7f00000002c0)=ANY=[], 0x4) r2 = gettid() tkill(r2, 0x3c) 13:27:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:27:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80004, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 369.174191][ T9626] gspca_sq905c: sq905c_command: usb_control_msg failed (-71) [ 369.181939][ T9626] sq905c: probe of 5-1:0.0 failed with error -71 [ 369.212988][ T961] Bluetooth: hci5: command 0x0419 tx timeout [ 369.224991][ T9626] usb 5-1: USB disconnect, device number 4 13:27:12 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x42, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 369.596133][T11908] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 369.635615][T11909] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 369.660530][T11910] loop0: detected capacity change from 0 to 1024 13:27:13 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xaa, 0xc5, 0x1d, 0x20, 0x2770, 0x9052, 0xcb32, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x54, 0x7d, 0xbd}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000400)={0x34, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0}) 13:27:13 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2d, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 369.829774][T11910] EXT4-fs (loop0): Test dummy encryption mode enabled [ 369.909433][T11910] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:27:13 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2e, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:13 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 370.001770][T11910] EXT4-fs (loop0): orphan cleanup on readonly fs [ 370.008451][T11910] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 370.020150][T11910] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:27:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:27:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000180)=0xffff, 0x4) recvmmsg(r1, &(0x7f0000001140)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff87}}], 0x700, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0xf0e8}, {0x8000, 0x9, 0x3, 0x8}, {0x1}, {0x5, 0x46, 0xfc, 0x80000001}, {0x8, 0x0, 0xfa}]}, 0x10) write$binfmt_misc(r0, &(0x7f00000002c0)=ANY=[], 0x4) r2 = gettid() tkill(r2, 0x3c) 13:27:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x2f, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80005, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 370.561874][T11930] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 370.574815][T11031] usb 5-1: new high-speed USB device number 5 using dummy_hcd [ 370.617762][T11932] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:27:14 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x46, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x6, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 370.832428][T11031] usb 5-1: Using ep0 maxpacket: 32 [ 370.974020][T11031] usb 5-1: New USB device found, idVendor=2770, idProduct=9052, bcdDevice=cb.32 [ 370.983428][T11031] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 371.006546][T11031] usb 5-1: config 0 descriptor?? [ 371.048531][T11031] gspca_main: sq905c-2.14.0 probing 2770:9052 [ 371.057679][T11940] loop0: detected capacity change from 0 to 1024 [ 371.099418][T11940] EXT4-fs (loop0): Test dummy encryption mode enabled 13:27:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x30, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:14 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x21, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1, 0x0, 0x0, 0x2bc0}, 0x350c) [ 371.219856][T11947] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 371.228804][T11940] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 371.265111][T11948] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 371.336681][T11940] EXT4-fs (loop0): orphan cleanup on readonly fs [ 371.343694][T11940] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 371.355932][T11940] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 371.722447][T11031] gspca_sq905c: sq905c_command: usb_control_msg failed (-71) [ 371.730161][T11031] sq905c: probe of 5-1:0.0 failed with error -71 [ 371.784696][T11031] usb 5-1: USB disconnect, device number 5 13:27:15 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xaa, 0xc5, 0x1d, 0x20, 0x2770, 0x9052, 0xcb32, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x54, 0x7d, 0xbd}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000400)={0x34, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0}) 13:27:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x7, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:27:15 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x48, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000880), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000380)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_CQM(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000003f00000008000300", @ANYRES32=r3, @ANYBLOB="18005e80040001"], 0x34}}, 0x0) 13:27:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80006, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:27:15 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x31, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 372.572576][T11973] loop0: detected capacity change from 0 to 1024 13:27:16 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x49, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 372.649223][T11973] EXT4-fs (loop0): Test dummy encryption mode enabled [ 372.706069][T11973] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:27:16 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x32, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 372.771721][T11973] EXT4-fs (loop0): orphan cleanup on readonly fs [ 372.778393][T11973] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 372.789859][T11973] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:27:16 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4a, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x8, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:27:16 executing program 5: syz_emit_ethernet(0x22, &(0x7f0000000080)={@local, @empty, @val, {@ipv4}}, 0x0) 13:27:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80007, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 373.205016][ T9626] usb 5-1: new high-speed USB device number 6 using dummy_hcd [ 373.475885][ T9626] usb 5-1: Using ep0 maxpacket: 32 [ 373.510031][T11993] __nla_validate_parse: 4 callbacks suppressed [ 373.510100][T11993] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 373.543193][T11995] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 373.637321][ T9626] usb 5-1: New USB device found, idVendor=2770, idProduct=9052, bcdDevice=cb.32 [ 373.639341][T11999] loop0: detected capacity change from 0 to 1024 [ 373.646837][ T9626] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 373.664258][T11999] EXT4-fs (loop0): Test dummy encryption mode enabled [ 373.674632][T11999] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 373.691154][ T9626] usb 5-1: config 0 descriptor?? [ 373.707682][T11999] EXT4-fs (loop0): orphan cleanup on readonly fs [ 373.714491][T11999] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 373.725927][T11999] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 373.753805][ T9626] gspca_main: sq905c-2.14.0 probing 2770:9052 [ 374.403259][ T9626] gspca_sq905c: sq905c_command: usb_control_msg failed (-71) [ 374.410963][ T9626] sq905c: probe of 5-1:0.0 failed with error -71 [ 374.431730][ T9626] usb 5-1: USB disconnect, device number 6 13:27:18 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xaa, 0xc5, 0x1d, 0x20, 0x2770, 0x9052, 0xcb32, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x54, 0x7d, 0xbd}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 13:27:18 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x33, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:18 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4b, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x48c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) ioctl$UFFDIO_ZEROPAGE(0xffffffffffffffff, 0xc020aa04, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc0000f, 0x1, 0x0, 0x0, 0x2000000000002) bpf$ITER_CREATE(0x21, 0x0, 0x0) 13:27:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x9, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:27:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80008, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 375.082958][T12026] loop0: detected capacity change from 0 to 1024 [ 375.090733][T12028] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 375.168692][T12031] mmap: syz-executor.5 (12031) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 375.212598][T12026] EXT4-fs (loop0): Test dummy encryption mode enabled 13:27:18 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4c, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 375.258076][T12035] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 375.318419][T12026] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:27:19 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x35, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 375.402509][T12026] EXT4-fs (loop0): orphan cleanup on readonly fs [ 375.411205][T12026] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 375.423075][T12026] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:27:19 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4d, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xa, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:27:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80009, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:27:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0xffffffffffffffff, 0x32) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xe, 0x16, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1, 0x10, &(0x7f0000000000), 0x39}, 0x48) r0 = gettid() rt_sigqueueinfo(r0, 0x3c, &(0x7f0000000040)={0x6000000}) [ 375.992717][ T9626] usb 5-1: new high-speed USB device number 7 using dummy_hcd [ 376.066615][T12050] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 376.141155][T12053] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 376.191552][T12056] loop0: detected capacity change from 0 to 1024 [ 376.253631][ T9626] usb 5-1: Using ep0 maxpacket: 32 [ 376.301036][T12056] EXT4-fs (loop0): Test dummy encryption mode enabled [ 376.373001][T12056] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 376.394006][ T9626] usb 5-1: New USB device found, idVendor=2770, idProduct=9052, bcdDevice=cb.32 [ 376.403476][ T9626] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 376.452406][T12056] EXT4-fs (loop0): orphan cleanup on readonly fs [ 376.458896][T12056] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 376.470522][T12056] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 376.492541][ T9626] usb 5-1: config 0 descriptor?? [ 376.541173][ T9626] gspca_main: sq905c-2.14.0 probing 2770:9052 [ 376.967427][ T9626] gspca_sq905c: sq905c_read: usb_control_msg failed (-71) [ 376.974777][ T9626] sq905c 5-1:0.0: Reading version command failed [ 376.981400][ T9626] sq905c: probe of 5-1:0.0 failed with error -71 [ 377.000551][ T9626] usb 5-1: USB disconnect, device number 7 13:27:21 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xaa, 0xc5, 0x1d, 0x20, 0x2770, 0x9052, 0xcb32, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x54, 0x7d, 0xbd}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 13:27:21 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4e, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:21 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x36, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="48000000100005060700"/20, @ANYRES32, @ANYBLOB="0000000000080000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="20000000140001040000000000e2fe5a23000000", @ANYRES32, @ANYBLOB="080002"], 0x20}}, 0x0) 13:27:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:27:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x8000a, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 377.689090][T12083] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 377.723552][T12082] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 377.738780][T12084] loop0: detected capacity change from 0 to 1024 [ 377.740179][T12089] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 377.770895][T12090] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 377.817459][T12090] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 377.849672][T12084] EXT4-fs (loop0): Test dummy encryption mode enabled [ 377.920317][T12084] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 377.988899][T12084] EXT4-fs (loop0): orphan cleanup on readonly fs [ 377.995614][T12084] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 378.007095][T12084] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:27:21 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x37, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:21 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0xdf19, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:27:21 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f0000000140), 0x6, 0x2) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f00000001c0)={0x0, 0xe, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "880c9f9d"}}) 13:27:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x8000b, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 378.353326][ T961] usb 5-1: new high-speed USB device number 8 using dummy_hcd 13:27:21 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x38, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 378.592885][ T961] usb 5-1: Using ep0 maxpacket: 32 [ 378.613443][T12111] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 378.651565][T12114] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 378.713703][ T961] usb 5-1: New USB device found, idVendor=2770, idProduct=9052, bcdDevice=cb.32 [ 378.723300][ T961] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 378.799029][ T961] usb 5-1: config 0 descriptor?? [ 378.876013][ T961] gspca_main: sq905c-2.14.0 probing 2770:9052 [ 378.999760][T12120] loop0: detected capacity change from 0 to 1024 [ 379.090243][T12120] EXT4-fs (loop0): Test dummy encryption mode enabled [ 379.103111][T12120] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 379.118256][T12120] EXT4-fs (loop0): orphan cleanup on readonly fs [ 379.124975][T12120] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 379.136449][T12120] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 379.282929][ T961] gspca_sq905c: sq905c_read: usb_control_msg failed (-71) [ 379.290175][ T961] sq905c 5-1:0.0: Reading version command failed [ 379.301189][ T961] sq905c: probe of 5-1:0.0 failed with error -71 [ 379.435786][ T961] usb 5-1: USB disconnect, device number 8 13:27:23 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xaa, 0xc5, 0x1d, 0x20, 0x2770, 0x9052, 0xcb32, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x54, 0x7d, 0xbd}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 13:27:23 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x2, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:23 executing program 5: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="580000001400ad", 0x7}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0x16) r3 = socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0xfef0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 13:27:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xd, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:27:23 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x39, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x8000c, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 379.977709][T12139] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 380.035911][T12143] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 380.079927][T12144] loop0: detected capacity change from 0 to 1024 [ 380.111389][T12144] EXT4-fs (loop0): Test dummy encryption mode enabled [ 380.131091][T12144] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 380.146580][T12144] EXT4-fs (loop0): orphan cleanup on readonly fs [ 380.153999][T12144] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 380.165518][T12144] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:27:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xe, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:27:24 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x4000000, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x8000d, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:27:24 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3a, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:24 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001300)=[{&(0x7f0000001640)=""/4096, 0x1000}], 0x1, 0x0, 0x0) r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local}, 0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x2, 0x0) [ 380.665871][T12156] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 380.682463][ T4672] usb 5-1: new high-speed USB device number 9 using dummy_hcd [ 380.715669][T12157] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 380.928452][ T4672] usb 5-1: Using ep0 maxpacket: 32 13:27:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xf, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 381.053625][ T4672] usb 5-1: New USB device found, idVendor=2770, idProduct=9052, bcdDevice=cb.32 [ 381.063458][ T4672] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 381.136491][T12167] loop0: detected capacity change from 0 to 1024 [ 381.219593][ T4672] usb 5-1: config 0 descriptor?? [ 381.278862][T12167] EXT4-fs (loop0): Test dummy encryption mode enabled [ 381.324456][ T4672] gspca_main: sq905c-2.14.0 probing 2770:9052 [ 381.353722][T12167] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 381.396961][T12167] EXT4-fs (loop0): orphan cleanup on readonly fs [ 381.403867][T12167] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 381.415354][T12167] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 381.702803][ T4672] gspca_sq905c: sq905c_read: usb_control_msg failed (-71) [ 381.710199][ T4672] sq905c 5-1:0.0: Reading version command failed [ 381.717090][ T4672] sq905c: probe of 5-1:0.0 failed with error -71 [ 381.778995][ T4672] usb 5-1: USB disconnect, device number 9 13:27:25 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xaa, 0xc5, 0x1d, 0x20, 0x2770, 0x9052, 0xcb32, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x54, 0x7d, 0xbd}}]}}]}}, 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000400)={0x34, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0}) 13:27:25 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3b, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x38, 0x0, 0xb, 0x301, 0x0, 0x0, {0x3}, [@NFTA_COMPAT_NAME={0x13, 0x1, '\\^+{*},(.,*`,)\x00'}, @NFTA_COMPAT_REV={0x8}, @NFTA_COMPAT_TYPE={0x8}]}, 0x38}}, 0x0) 13:27:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x8000e, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 383.933181][ T4672] Bluetooth: hci2: command 0x0406 tx timeout [ 386.983561][ T3119] ieee802154 phy0 wpan0: encryption failed: -22 [ 386.990068][ T3119] ieee802154 phy1 wpan1: encryption failed: -22 13:27:34 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x8000000, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 390.916420][T12195] loop0: detected capacity change from 0 to 1024 [ 390.930246][T12196] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:27:34 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0xfffffff, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 391.042463][T12195] EXT4-fs (loop0): Test dummy encryption mode enabled [ 391.100171][T12195] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 391.186188][T12195] EXT4-fs (loop0): orphan cleanup on readonly fs [ 391.192941][T12195] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 391.205589][T12195] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 391.242709][ T9626] usb 5-1: new high-speed USB device number 10 using dummy_hcd 13:27:34 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3c, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:27:35 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r0, 0x400454ca, 0x400030) ioctl$TUNSETOFFLOAD(r0, 0x400454c9, 0x1) ioctl$TUNSETLINK(r0, 0x400454cd, 0x1) [ 391.492515][ T9626] usb 5-1: Using ep0 maxpacket: 32 [ 391.623397][ T9626] usb 5-1: New USB device found, idVendor=2770, idProduct=9052, bcdDevice=cb.32 [ 391.632937][ T9626] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 391.695109][ T9626] usb 5-1: config 0 descriptor?? 13:27:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x8000f, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 391.738867][ T9626] gspca_main: sq905c-2.14.0 probing 2770:9052 13:27:35 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x1fffffbf, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 392.066963][T12221] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:27:35 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3e, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 392.171294][T12225] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 392.181674][ T9626] gspca_sq905c: sq905c_read: usb_control_msg failed (-71) [ 392.189244][ T9626] sq905c 5-1:0.0: Reading version command failed [ 392.196080][ T9626] sq905c: probe of 5-1:0.0 failed with error -71 [ 392.316562][ T9626] usb 5-1: USB disconnect, device number 10 [ 392.375725][T12230] loop0: detected capacity change from 0 to 1024 [ 392.454536][T12230] EXT4-fs (loop0): Test dummy encryption mode enabled [ 392.467988][T12230] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 392.487657][T12230] EXT4-fs (loop0): orphan cleanup on readonly fs [ 392.494434][T12230] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 392.506117][T12230] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:27:36 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xaa, 0xc5, 0x1d, 0x20, 0x2770, 0x9052, 0xcb32, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x54, 0x7d, 0xbd}}]}}]}}, 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000400)={0x34, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0}) 13:27:36 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 13:27:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x11, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:27:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80010, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:27:36 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x41, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 393.137725][T12244] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 393.188157][T12246] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:27:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x12, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 393.622766][T12256] loop0: detected capacity change from 0 to 1024 [ 393.733394][T12256] EXT4-fs (loop0): Test dummy encryption mode enabled [ 393.746240][T12256] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 393.798608][T12256] EXT4-fs (loop0): orphan cleanup on readonly fs [ 393.805310][T12256] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 393.816748][T12256] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 393.830379][ T8475] usb 5-1: new high-speed USB device number 11 using dummy_hcd [ 394.018350][T12264] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:27:37 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x42, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 394.072513][ T8475] usb 5-1: Using ep0 maxpacket: 32 [ 394.116009][T12266] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 394.193379][ T8475] usb 5-1: New USB device found, idVendor=2770, idProduct=9052, bcdDevice=cb.32 [ 394.202824][ T8475] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 13:27:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80011, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 394.307218][ T8475] usb 5-1: config 0 descriptor?? [ 394.371797][ T8475] gspca_main: sq905c-2.14.0 probing 2770:9052 13:27:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x24, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:27:38 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 394.737352][T12274] loop0: detected capacity change from 0 to 1024 [ 394.772571][ T8475] gspca_sq905c: sq905c_read: usb_control_msg failed (-71) [ 394.779934][ T8475] sq905c 5-1:0.0: Reading version command failed [ 394.786760][ T8475] sq905c: probe of 5-1:0.0 failed with error -71 [ 394.800554][ T8475] usb 5-1: USB disconnect, device number 11 [ 394.847114][T12274] EXT4-fs (loop0): Test dummy encryption mode enabled [ 394.855217][T12274] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 394.882578][T12274] EXT4-fs (loop0): orphan cleanup on readonly fs [ 394.889055][T12274] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 394.900562][T12274] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 394.987095][T12284] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 395.053331][T12286] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:27:45 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x20000a30, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x25, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:27:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80012, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:27:45 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xaa, 0xc5, 0x1d, 0x20, 0x2770, 0x9052, 0xcb32, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x54, 0x7d, 0xbd}}]}}]}}, 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000400)={0x34, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0}) 13:27:45 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001000), 0x149802, 0x0) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80006) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x28011, r1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) [ 402.457258][T12315] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 402.516702][T12318] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 402.594398][T12320] loop0: detected capacity change from 0 to 1024 13:27:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x48, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:27:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x46, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 402.735569][T12320] EXT4-fs (loop0): Test dummy encryption mode enabled [ 402.805669][T12320] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 402.842681][ T4672] usb 5-1: new high-speed USB device number 12 using dummy_hcd [ 402.881141][T12320] EXT4-fs (loop0): orphan cleanup on readonly fs [ 402.887831][T12320] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 402.899286][T12320] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:27:46 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 403.102762][ T4672] usb 5-1: Using ep0 maxpacket: 32 [ 403.120089][T12331] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 403.164580][T12332] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:27:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80018, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 403.223430][ T4672] usb 5-1: New USB device found, idVendor=2770, idProduct=9052, bcdDevice=cb.32 [ 403.232962][ T4672] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 403.324414][ T4672] usb 5-1: config 0 descriptor?? [ 403.374849][ T4672] gspca_main: sq905c-2.14.0 probing 2770:9052 13:27:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x4c, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:27:47 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x48, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:47 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x2, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 403.812846][ T4672] gspca_sq905c: sq905c_read: usb_control_msg failed (-71) [ 403.820099][ T4672] sq905c 5-1:0.0: Reading version command failed [ 403.826978][ T4672] sq905c: probe of 5-1:0.0 failed with error -71 13:27:47 executing program 5: syz_emit_ethernet(0x46, &(0x7f0000000000)={@broadcast, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "462f9d", 0x10, 0x3a, 0x0, @empty, @mcast2, {[], @ni={0x8c}}}}}}, 0x0) [ 403.901133][T12346] loop0: detected capacity change from 0 to 1024 [ 403.944618][ T4672] usb 5-1: USB disconnect, device number 12 [ 404.021704][T12353] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 404.039482][T12354] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 404.066690][T12346] EXT4-fs (loop0): Test dummy encryption mode enabled 13:27:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x60, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 404.127748][T12346] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 404.199033][T12346] EXT4-fs (loop0): orphan cleanup on readonly fs [ 404.205738][T12346] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 404.217282][T12346] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:27:48 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x49, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:48 executing program 4: syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$printer(0xffffffffffffffff, 0x0, &(0x7f0000000400)={0x34, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0}) 13:27:48 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x3, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80021, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 404.638812][T12364] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 404.711268][T12365] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:27:48 executing program 5: r0 = openat$procfs(0xffffff9c, &(0x7f0000000040)='/proc/tty/ldiscs\x00', 0x0, 0x0) lseek(r0, 0xe, 0x0) 13:27:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x68, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:27:48 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4a, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:48 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x4, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 405.262335][T12377] loop0: detected capacity change from 0 to 1024 [ 405.417061][T12377] EXT4-fs (loop0): Test dummy encryption mode enabled [ 405.445682][T12377] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:27:49 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae89, &(0x7f0000000040)={0x3, 0x0, [{0xe1}]}) [ 405.494786][T12377] EXT4-fs (loop0): orphan cleanup on readonly fs [ 405.501284][T12377] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 405.509095][T12383] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 405.515671][T12377] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 405.668062][T12386] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:27:49 executing program 4: syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$printer(0xffffffffffffffff, 0x0, &(0x7f0000000400)={0x34, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0}) 13:27:49 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4b, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80025, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:27:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x6c, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:27:49 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x8, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:50 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x40085112, &(0x7f0000000000)=@e={0xff, 0xa, 0x0, 0x0, @SEQ_NOTEON=@special}) 13:27:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x74, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:27:50 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4c, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 406.608471][T12411] loop0: detected capacity change from 0 to 1024 [ 406.683830][T12411] EXT4-fs (loop0): Test dummy encryption mode enabled [ 406.691665][T12411] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 406.718358][T12411] EXT4-fs (loop0): orphan cleanup on readonly fs [ 406.725090][T12411] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 406.736563][T12411] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:27:50 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x1d, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x8002e, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:27:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x60, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_FRAME={0x42, 0x33, @assoc_req={@with_ht={{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {}, @device_b}}, 0x0, 0x0, {}, @void, @val={0x2d, 0x1a}}}]}, 0x60}}, 0x0) 13:27:50 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4d, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:50 executing program 4: syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$printer(0xffffffffffffffff, 0x0, &(0x7f0000000400)={0x34, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0}) 13:27:50 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x59, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x7a, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 407.613425][T12430] loop0: detected capacity change from 0 to 1024 [ 407.720514][T12430] EXT4-fs (loop0): Test dummy encryption mode enabled [ 407.728444][T12430] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 407.743594][T12430] EXT4-fs (loop0): orphan cleanup on readonly fs [ 407.750069][T12430] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 13:27:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4e, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 407.761914][T12430] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:27:51 executing program 5: r0 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x10}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x81}, 0x1c) 13:27:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x8002f, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:27:51 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x61, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 408.062842][T12443] __nla_validate_parse: 4 callbacks suppressed [ 408.062910][T12443] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 408.172949][T12445] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:27:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xd2, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:27:52 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0xc932, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:52 executing program 4: r0 = syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000400)={0x34, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0}) [ 408.498610][T12452] loop0: detected capacity change from 0 to 1024 [ 408.563732][T12452] EXT4-fs (loop0): Test dummy encryption mode enabled [ 408.580906][T12452] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:27:52 executing program 5: r0 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x10}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x81}, 0x1c) [ 408.647596][T12452] EXT4-fs (loop0): orphan cleanup on readonly fs [ 408.654432][T12452] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 408.665979][T12452] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 408.725336][T12459] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 408.758687][T12460] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:27:52 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x135, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80030, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:27:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x300, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:27:52 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x2, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:52 executing program 5: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000080)=0x10000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f0000000700)={@my=0x0}) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r0, 0x7a8, &(0x7f0000000180)={{@host}, @hyper, 0x1, 0x0, 0x8000}) 13:27:52 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x210, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 409.437711][T12472] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 409.523061][T12474] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:27:53 executing program 4: r0 = syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000400)={0x34, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0}) [ 409.583751][T12476] loop0: detected capacity change from 0 to 1024 [ 409.699164][T12476] EXT4-fs (loop0): Test dummy encryption mode enabled [ 409.739929][T12476] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 409.810628][T12476] EXT4-fs (loop0): orphan cleanup on readonly fs [ 409.819662][T12476] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 409.831475][T12476] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:27:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x500, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:27:53 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x4000000, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:27:53 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000640)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000cc0)={0x40, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_TX_RATES={0x24, 0x5a, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x20, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14}]}]}]}, 0x40}}, 0x0) 13:27:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80031, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:27:53 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x294, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 410.407821][T12492] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 410.453942][T12494] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:27:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x600, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:27:54 executing program 4: r0 = syz_usb_connect(0x0, 0x0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000400)={0x34, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0}) [ 410.873475][T12503] loop0: detected capacity change from 0 to 1024 13:27:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000001c40)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0x62}]}]}]}, 0x2c}}, 0x0) [ 411.029255][T12503] EXT4-fs (loop0): Test dummy encryption mode enabled [ 411.101817][T12503] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 411.201061][T12503] EXT4-fs (loop0): orphan cleanup on readonly fs [ 411.207819][T12503] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 411.219572][T12503] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:27:55 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80032, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 414.652435][ T1981] Bluetooth: hci3: command 0x0406 tx timeout [ 418.026151][T12527] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:28:01 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x2a8, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:01 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x8000000, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 418.067723][T12529] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 418.123564][T12531] loop0: detected capacity change from 0 to 1024 [ 418.177703][T12531] EXT4-fs (loop0): Test dummy encryption mode enabled [ 418.198328][T12531] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:28:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x700, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 418.262676][T12531] EXT4-fs (loop0): orphan cleanup on readonly fs [ 418.269169][T12531] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 418.281134][T12531] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:28:02 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) sendfile(r2, r0, &(0x7f0000000040), 0x0) 13:28:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80033, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:28:02 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0xfffffff, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 418.751872][T12544] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 418.820140][T12545] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:28:02 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x2cc, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:02 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xaa, 0xc5, 0x1d, 0x0, 0x2770, 0x9052, 0xcb32, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x54, 0x7d, 0xbd}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000400)={0x34, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0}) 13:28:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x900, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 419.190655][T12553] loop0: detected capacity change from 0 to 1024 13:28:02 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x41, 0x3, &(0x7f0000000140)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 419.368937][T12553] EXT4-fs (loop0): Test dummy encryption mode enabled [ 419.458378][T12553] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:28:03 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x1fffffbf, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 419.519394][T12553] EXT4-fs (loop0): orphan cleanup on readonly fs [ 419.526247][T12553] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 419.537694][T12553] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:28:03 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x2d8, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 419.858947][T12568] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 419.898851][T12570] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 419.922691][ T9626] usb 5-1: new high-speed USB device number 13 using dummy_hcd 13:28:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80034, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:28:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00005f8ffe)='#}\x00', 0x0) ftruncate(r1, 0x140002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000e4effc)=0x4, 0x4) sendfile(r0, r1, 0x0, 0xffffffffffe) [ 420.122276][ T9626] usb 5-1: device descriptor read/64, error 18 13:28:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xa00, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:04 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x300, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 420.405967][ T9626] usb 5-1: new high-speed USB device number 14 using dummy_hcd [ 420.617432][ T9626] usb 5-1: device descriptor read/64, error 18 [ 420.679401][T12580] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 420.707404][T12582] loop0: detected capacity change from 0 to 1024 [ 420.748114][ T9626] usb usb5-port1: attempt power cycle [ 420.767252][T12582] EXT4-fs (loop0): Test dummy encryption mode enabled [ 420.780012][T12587] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 420.780280][T12582] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 420.825927][T12582] EXT4-fs (loop0): orphan cleanup on readonly fs [ 420.832569][T12582] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 420.844069][T12582] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:28:04 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x378, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xb00, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80035, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 421.473440][ T9626] usb 5-1: new high-speed USB device number 15 using dummy_hcd [ 421.573423][ T9626] usb 5-1: Invalid ep0 maxpacket: 0 [ 421.600576][T12595] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 421.654845][T12597] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 421.724524][ T9626] usb 5-1: new high-speed USB device number 16 using dummy_hcd [ 421.843299][ T9626] usb 5-1: Invalid ep0 maxpacket: 0 [ 421.859612][ T9626] usb usb5-port1: unable to enumerate USB device [ 421.949024][T12599] loop0: detected capacity change from 0 to 1024 [ 421.993554][T12599] EXT4-fs (loop0): Test dummy encryption mode enabled [ 422.004074][T12599] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 422.026912][T12599] EXT4-fs (loop0): orphan cleanup on readonly fs [ 422.033637][T12599] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 422.045302][T12599] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:28:06 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xaa, 0xc5, 0x1d, 0x0, 0x2770, 0x9052, 0xcb32, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x54, 0x7d, 0xbd}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000400)={0x34, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0}) 13:28:06 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x1002, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:06 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000000200), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000040)={0x1, 0x10, [0x0, 0x0, 0x0, 0x0]}) [ 423.282184][ T4672] usb 5-1: new high-speed USB device number 17 using dummy_hcd [ 423.472533][ T4672] usb 5-1: device descriptor read/64, error 18 [ 423.742758][ T4672] usb 5-1: new high-speed USB device number 18 using dummy_hcd [ 423.932366][ T4672] usb 5-1: device descriptor read/64, error 18 [ 424.053902][ T4672] usb usb5-port1: attempt power cycle [ 424.792519][ T4672] usb 5-1: new high-speed USB device number 19 using dummy_hcd [ 424.882726][ T4672] usb 5-1: Invalid ep0 maxpacket: 0 [ 425.044469][ T4672] usb 5-1: new high-speed USB device number 20 using dummy_hcd [ 425.145530][ T4672] usb 5-1: Invalid ep0 maxpacket: 0 [ 425.151386][ T4672] usb usb5-port1: unable to enumerate USB device 13:28:12 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x20000a30, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc00, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80036, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:28:12 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f00000015c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5ac, 0x216, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) 13:28:12 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xaa, 0xc5, 0x1d, 0x0, 0x2770, 0x9052, 0xcb32, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x54, 0x7d, 0xbd}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000400)={0x34, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0}) 13:28:12 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x1d00, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 429.193418][T12635] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 429.237489][T12637] loop0: detected capacity change from 0 to 1024 [ 429.271368][T12643] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 429.323210][T12637] EXT4-fs (loop0): Test dummy encryption mode enabled [ 429.389705][T12637] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:28:13 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x2000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 429.492918][T12637] EXT4-fs (loop0): orphan cleanup on readonly fs [ 429.499399][T12637] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 429.514339][T12637] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 429.542201][ T1981] usb 5-1: new high-speed USB device number 21 using dummy_hcd [ 429.550117][ T9626] usb 6-1: new high-speed USB device number 2 using dummy_hcd 13:28:13 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xd00, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 429.756024][ T1981] usb 5-1: device descriptor read/64, error 18 [ 429.802641][ T9626] usb 6-1: Using ep0 maxpacket: 16 [ 429.932719][ T9626] usb 6-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 430.033024][ T1981] usb 5-1: new high-speed USB device number 22 using dummy_hcd 13:28:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80037, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 430.123520][ T9626] usb 6-1: New USB device found, idVendor=05ac, idProduct=0216, bcdDevice= 0.40 [ 430.132945][ T9626] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 430.141093][ T9626] usb 6-1: Product: syz [ 430.145598][ T9626] usb 6-1: Manufacturer: syz [ 430.150321][ T9626] usb 6-1: SerialNumber: syz [ 430.222424][ T1981] usb 5-1: device descriptor read/64, error 18 [ 430.259303][T12657] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 430.305155][T12658] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:28:13 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x3501, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 430.349738][ T1981] usb usb5-port1: attempt power cycle 13:28:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x2, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 430.411788][ T9626] usbhid 6-1:1.0: couldn't find an input interrupt endpoint 13:28:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xdde, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 430.610785][T11031] usb 6-1: USB disconnect, device number 2 [ 430.801867][T12672] loop0: detected capacity change from 0 to 1024 [ 430.871650][T12672] EXT4-fs (loop0): Test dummy encryption mode enabled [ 430.884219][T12672] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 430.901800][T12672] EXT4-fs (loop0): orphan cleanup on readonly fs [ 430.910618][T12672] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 430.922454][T12672] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:28:14 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x6100, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 431.082389][ T1981] usb 5-1: new high-speed USB device number 23 using dummy_hcd 13:28:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x3, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 431.182735][T12681] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 431.194314][ T1981] usb 5-1: Invalid ep0 maxpacket: 0 [ 431.249374][T12682] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:28:14 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='ext4_journal_start\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) [ 431.352803][ T1981] usb 5-1: new high-speed USB device number 24 using dummy_hcd [ 431.452728][ T1981] usb 5-1: Invalid ep0 maxpacket: 0 [ 431.459635][ T1981] usb usb5-port1: unable to enumerate USB device 13:28:15 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xaa, 0xc5, 0x1d, 0x20, 0x2770, 0x9052, 0xcb32, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x54, 0x7d, 0xbd}}]}}]}}, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000400)={0x34, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0}) 13:28:15 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80048, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:28:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xe00, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:15 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x7803, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:15 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x4, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:15 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) ppoll(&(0x7f0000000000)=[{r1}], 0x1, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f0000000080)=@abs, 0x6e) [ 432.434573][T12704] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:28:16 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x9402, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 432.479255][T12705] loop0: detected capacity change from 0 to 1024 [ 432.504306][T12709] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 432.566135][T12705] EXT4-fs (loop0): Test dummy encryption mode enabled [ 432.582655][T12705] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 432.597377][T12705] EXT4-fs (loop0): orphan cleanup on readonly fs [ 432.604145][T12705] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 432.615640][T12705] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:28:16 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x8, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:16 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x14, 0x14, 0x1, 0x0, 0x0, {0x2c}}, 0x14}}, 0x0) 13:28:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x8004c, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:28:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xf00, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:16 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0xa802, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 433.342575][ T2950] usb 5-1: new high-speed USB device number 25 using dummy_hcd [ 433.355814][T12724] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 433.439139][T12727] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 433.475993][T12726] loop0: detected capacity change from 0 to 1024 [ 433.549532][T12726] EXT4-fs (loop0): Test dummy encryption mode enabled [ 433.582263][ T2950] usb 5-1: Using ep0 maxpacket: 32 [ 433.619839][T12726] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 433.703447][ T2950] usb 5-1: New USB device found, idVendor=2770, idProduct=9052, bcdDevice=cb.32 [ 433.712824][ T2950] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 433.739572][T12726] EXT4-fs (loop0): orphan cleanup on readonly fs [ 433.746279][T12726] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 433.757716][T12726] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 433.808135][ T2950] usb 5-1: config 0 descriptor?? [ 433.870685][ T2950] gspca_main: sq905c-2.14.0 probing 2770:9052 [ 434.296965][ T2950] gspca_sq905c: sq905c_read: usb_control_msg failed (-71) [ 434.304536][ T2950] sq905c 5-1:0.0: Reading version command failed [ 434.311148][ T2950] sq905c: probe of 5-1:0.0 failed with error -71 [ 434.347722][ T2950] usb 5-1: USB disconnect, device number 25 13:28:18 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xaa, 0xc5, 0x1d, 0x20, 0x2770, 0x9052, 0xcb32, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x54, 0x7d, 0xbd}}]}}]}}, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000400)={0x34, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0}) 13:28:18 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x1d, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:18 executing program 5: request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x0, 0x3}, 0x0, 0x0) 13:28:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x1100, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:18 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0xcc02, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x8005c, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 435.054975][T12758] loop0: detected capacity change from 0 to 1024 [ 435.089788][T12760] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 435.102715][T12758] EXT4-fs (loop0): Test dummy encryption mode enabled [ 435.115423][T12758] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 435.130551][T12758] EXT4-fs (loop0): orphan cleanup on readonly fs [ 435.137339][T12758] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 435.148707][T12758] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:28:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80060, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:28:18 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0xd802, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 435.238268][T12765] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:28:18 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r0, 0x402, 0xb1c661d398500c73) fcntl$notify(r0, 0x402, 0x2d) 13:28:18 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x41, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x1200, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 435.787964][T12776] loop0: detected capacity change from 0 to 1024 [ 435.824394][ T1981] usb 5-1: new high-speed USB device number 26 using dummy_hcd [ 435.856143][T12783] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 435.939742][T12776] EXT4-fs (loop0): Test dummy encryption mode enabled [ 435.968043][T12784] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:28:19 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000580), 0x1ff, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064b2, &(0x7f0000000180)={0x4, 0x8, 0x5, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r0, 0xc01064b3, &(0x7f0000000840)={r1}) [ 436.036305][T12776] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 436.072267][ T1981] usb 5-1: Using ep0 maxpacket: 32 [ 436.120373][T12776] EXT4-fs (loop0): orphan cleanup on readonly fs [ 436.127218][T12776] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 436.141065][T12776] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 436.242377][ T1981] usb 5-1: New USB device found, idVendor=2770, idProduct=9052, bcdDevice=cb.32 [ 436.251688][ T1981] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 436.283063][ T1981] usb 5-1: config 0 descriptor?? [ 436.349164][ T1981] gspca_main: sq905c-2.14.0 probing 2770:9052 [ 436.805846][ T1981] gspca_sq905c: sq905c_read: usb_control_msg failed (-71) [ 436.813339][ T1981] sq905c 5-1:0.0: Reading version command failed [ 436.820055][ T1981] sq905c: probe of 5-1:0.0 failed with error -71 [ 436.851144][ T1981] usb 5-1: USB disconnect, device number 26 13:28:20 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xaa, 0xc5, 0x1d, 0x20, 0x2770, 0x9052, 0xcb32, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x54, 0x7d, 0xbd}}]}}]}}, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000400)={0x34, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0}) 13:28:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x2000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:20 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x59, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:20 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x30000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80068, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:28:20 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) accept4$rose(r0, 0x0, 0x0, 0x0) [ 437.604658][T12809] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 437.632870][T12811] loop0: detected capacity change from 0 to 1024 13:28:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f00000001c0)={0x1, 0x0, [{0x400000b7}]}) [ 437.670065][T12811] EXT4-fs (loop0): Test dummy encryption mode enabled [ 437.747276][T12815] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 437.762288][T12811] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:28:21 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x160, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:21 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x40000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 437.818786][T12811] EXT4-fs (loop0): orphan cleanup on readonly fs [ 437.825490][T12811] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 437.837277][T12811] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:28:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x2400, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x8006c, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 438.552555][ T2950] usb 5-1: new high-speed USB device number 27 using dummy_hcd [ 438.585238][T12833] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:28:22 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x210, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 438.686937][T12834] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 438.794413][ T2950] usb 5-1: Using ep0 maxpacket: 32 [ 438.913635][ T2950] usb 5-1: New USB device found, idVendor=2770, idProduct=9052, bcdDevice=cb.32 [ 438.923304][ T2950] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 439.021244][ T2950] usb 5-1: config 0 descriptor?? [ 439.031892][T12837] loop0: detected capacity change from 0 to 1024 [ 439.069442][ T2950] gspca_main: sq905c-2.14.0 probing 2770:9052 [ 439.158920][T12837] EXT4-fs (loop0): Test dummy encryption mode enabled [ 439.181946][T12837] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 439.229862][T12837] EXT4-fs (loop0): orphan cleanup on readonly fs [ 439.236664][T12837] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 439.248372][T12837] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 439.512439][ T2950] gspca_sq905c: sq905c_read: usb_control_msg failed (-71) [ 439.519681][ T2950] sq905c 5-1:0.0: Reading version command failed [ 439.526937][ T2950] sq905c: probe of 5-1:0.0 failed with error -71 [ 439.539019][ T2950] usb 5-1: USB disconnect, device number 27 13:28:23 executing program 5: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000000), 0x8001, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000040)) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000100)=0xb6ad) 13:28:23 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x200000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x2500, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:23 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x294, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80074, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:28:23 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xaa, 0xc5, 0x1d, 0x20, 0x2770, 0x9052, 0xcb32, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x54, 0x7d, 0xbd}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$printer(0xffffffffffffffff, 0x0, &(0x7f0000000400)={0x34, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0}) [ 440.254453][T12862] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 440.355426][T12868] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 440.377874][T12866] loop0: detected capacity change from 0 to 1024 [ 440.521397][T12866] EXT4-fs (loop0): Test dummy encryption mode enabled [ 440.547709][T12866] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 440.565012][T12866] EXT4-fs (loop0): orphan cleanup on readonly fs [ 440.571584][T12866] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 440.583459][T12866] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:28:24 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x2cc, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:24 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x1000000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 440.812346][ T1981] usb 5-1: new high-speed USB device number 28 using dummy_hcd 13:28:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x4788, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:24 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x8007a, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:28:24 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f00000021c0)=ANY=[@ANYBLOB='<'], 0x163c}}, 0x0) [ 441.082435][ T1981] usb 5-1: Using ep0 maxpacket: 32 [ 441.203363][ T1981] usb 5-1: New USB device found, idVendor=2770, idProduct=9052, bcdDevice=cb.32 [ 441.212768][ T1981] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 13:28:24 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x2d8, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 441.301596][T12882] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 441.350277][ T1981] usb 5-1: config 0 descriptor?? 13:28:25 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x2000000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 441.412304][T12884] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 441.469873][ T1981] gspca_main: sq905c-2.14.0 probing 2770:9052 [ 441.624545][T12888] loop0: detected capacity change from 0 to 1024 [ 441.651913][T12888] EXT4-fs (loop0): Test dummy encryption mode enabled [ 441.664525][T12888] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 441.690528][T12888] EXT4-fs (loop0): orphan cleanup on readonly fs [ 441.697291][T12888] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 441.708764][T12888] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:28:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x4800, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 441.814557][ T1981] gspca_sq905c: sq905c_read: usb_control_msg failed (-71) [ 441.821802][ T1981] sq905c 5-1:0.0: Reading version command failed [ 441.829247][ T1981] sq905c: probe of 5-1:0.0 failed with error -71 13:28:25 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) 13:28:25 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x2f9, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 441.931783][ T1981] usb 5-1: USB disconnect, device number 28 13:28:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80089, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 442.239907][T12905] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 442.310593][T12907] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:28:26 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xaa, 0xc5, 0x1d, 0x20, 0x2770, 0x9052, 0xcb32, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x54, 0x7d, 0xbd}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$printer(0xffffffffffffffff, 0x0, &(0x7f0000000400)={0x34, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0}) 13:28:26 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x3000000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x4888, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 442.618645][T12913] loop0: detected capacity change from 0 to 1024 13:28:26 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x300, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:26 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) [ 442.764828][T12913] EXT4-fs (loop0): Test dummy encryption mode enabled [ 442.782851][T12913] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 442.801517][T12913] EXT4-fs (loop0): orphan cleanup on readonly fs [ 442.808429][T12913] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 442.820852][T12913] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:28:26 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x4000000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x800ac, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 443.149199][T12926] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 443.178774][ T2950] usb 5-1: new high-speed USB device number 29 using dummy_hcd 13:28:26 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x378, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 443.253279][T12928] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:28:27 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) [ 443.422528][ T2950] usb 5-1: Using ep0 maxpacket: 32 13:28:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x4c00, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 443.543659][ T2950] usb 5-1: New USB device found, idVendor=2770, idProduct=9052, bcdDevice=cb.32 [ 443.553259][ T2950] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 443.688398][ T2950] usb 5-1: config 0 descriptor?? [ 443.743591][ T2950] gspca_main: sq905c-2.14.0 probing 2770:9052 13:28:27 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x8000000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 443.889513][T12938] loop0: detected capacity change from 0 to 1024 13:28:27 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x3c5, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 443.996588][T12938] EXT4-fs (loop0): Test dummy encryption mode enabled [ 444.059613][T12938] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 444.132414][T12938] EXT4-fs (loop0): orphan cleanup on readonly fs [ 444.139074][T12938] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 444.151039][T12938] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 444.154598][T12947] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 444.186746][ T2950] gspca_sq905c: sq905c_read: usb_control_msg failed (-71) [ 444.194282][ T2950] sq905c 5-1:0.0: Reading version command failed [ 444.200983][ T2950] sq905c: probe of 5-1:0.0 failed with error -71 [ 444.246690][ T2950] usb 5-1: USB disconnect, device number 29 [ 444.296620][T12953] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:28:28 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xaa, 0xc5, 0x1d, 0x20, 0x2770, 0x9052, 0xcb32, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x54, 0x7d, 0xbd}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$printer(0xffffffffffffffff, 0x0, &(0x7f0000000400)={0x34, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0}) 13:28:28 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x10020000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:28 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) 13:28:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x800d4, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:28:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x5865, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:28 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x1002, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 445.005133][T12967] loop0: detected capacity change from 0 to 1024 [ 445.113653][T12967] EXT4-fs (loop0): Test dummy encryption mode enabled [ 445.121428][T12967] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 445.147426][T12967] EXT4-fs (loop0): orphan cleanup on readonly fs [ 445.154193][T12967] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 445.165727][T12967] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:28:28 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x1d000000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:28 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) 13:28:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x6000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:29 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x1d00, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 445.374237][ T2950] Bluetooth: hci4: command 0x0406 tx timeout 13:28:29 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x800d5, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 445.502342][ T9670] usb 5-1: new high-speed USB device number 30 using dummy_hcd [ 445.668181][T12978] __nla_validate_parse: 2 callbacks suppressed [ 445.668250][T12978] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 445.742241][ T9670] usb 5-1: Using ep0 maxpacket: 32 [ 445.748140][T12983] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 445.863557][ T9670] usb 5-1: New USB device found, idVendor=2770, idProduct=9052, bcdDevice=cb.32 [ 445.872997][ T9670] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 13:28:29 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x35010000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 445.981435][ T9670] usb 5-1: config 0 descriptor?? [ 446.053274][ T9670] gspca_main: sq905c-2.14.0 probing 2770:9052 [ 446.111859][T12988] loop0: detected capacity change from 0 to 1024 [ 446.246744][T12988] EXT4-fs (loop0): Test dummy encryption mode enabled [ 446.290063][T12988] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 446.307953][T12988] EXT4-fs (loop0): orphan cleanup on readonly fs [ 446.314764][T12988] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 446.326415][T12988] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 446.442763][ T9670] gspca_sq905c: sq905c_read: usb_control_msg failed (-71) [ 446.450110][ T9670] sq905c 5-1:0.0: Reading version command failed [ 446.457463][ T9670] sq905c: probe of 5-1:0.0 failed with error -71 [ 446.570094][ T9670] usb 5-1: USB disconnect, device number 30 13:28:30 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xaa, 0xc5, 0x1d, 0x20, 0x2770, 0x9052, 0xcb32, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x54, 0x7d, 0xbd}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) 13:28:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x6558, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:30 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x2000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x800d6, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:28:30 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) 13:28:30 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x59000000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 447.266035][T13011] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 447.326181][T13015] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 447.387051][T13016] loop0: detected capacity change from 0 to 1024 13:28:31 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x4100, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x6800, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 447.567646][T13016] EXT4-fs (loop0): Test dummy encryption mode enabled 13:28:31 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x61000000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 447.636413][T13016] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:28:31 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) [ 447.714908][T13016] EXT4-fs (loop0): orphan cleanup on readonly fs [ 447.721419][T13016] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 447.733067][T13016] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 447.952548][ T4672] usb 5-1: new high-speed USB device number 31 using dummy_hcd [ 448.146106][T13030] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:28:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x800d7, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 448.189855][T13031] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 448.205301][ T4672] usb 5-1: Using ep0 maxpacket: 32 [ 448.323301][ T4672] usb 5-1: New USB device found, idVendor=2770, idProduct=9052, bcdDevice=cb.32 [ 448.332755][ T4672] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 13:28:32 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x6001, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 448.427467][ T3119] ieee802154 phy0 wpan0: encryption failed: -22 [ 448.434039][ T3119] ieee802154 phy1 wpan1: encryption failed: -22 [ 448.435680][ T4672] usb 5-1: config 0 descriptor?? [ 448.573862][ T4672] gspca_main: sq905c-2.14.0 probing 2770:9052 [ 448.821555][T13040] loop0: detected capacity change from 0 to 1024 [ 448.905520][T13040] EXT4-fs (loop0): Test dummy encryption mode enabled [ 448.913713][T13040] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 448.916486][ T4672] gspca_sq905c: sq905c_read: usb_control_msg failed (-71) [ 448.931799][T13040] EXT4-fs (loop0): orphan cleanup on readonly fs [ 448.931888][T13040] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 448.932303][T13040] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 448.964818][ T4672] sq905c 5-1:0.0: Reading version command failed [ 448.971451][ T4672] sq905c: probe of 5-1:0.0 failed with error -71 [ 449.048155][ T4672] usb 5-1: USB disconnect, device number 31 13:28:33 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xaa, 0xc5, 0x1d, 0x20, 0x2770, 0x9052, 0xcb32, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x54, 0x7d, 0xbd}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) 13:28:33 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x78030000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x6c00, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:33 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x7803, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:33 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) 13:28:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x800d8, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 449.699799][T13060] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 449.732392][T13061] loop0: detected capacity change from 0 to 1024 13:28:33 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x94020000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 449.797608][T13066] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 449.933959][T13061] EXT4-fs (loop0): Test dummy encryption mode enabled [ 450.007083][T13061] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:28:33 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x9402, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:33 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) 13:28:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x7400, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 450.126663][T13061] EXT4-fs (loop0): orphan cleanup on readonly fs [ 450.133802][T13061] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 450.145289][T13061] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 450.402350][ T1981] usb 5-1: new high-speed USB device number 32 using dummy_hcd 13:28:34 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0xa8020000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 450.653092][ T1981] usb 5-1: Using ep0 maxpacket: 32 13:28:34 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x800d9, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 450.769861][T13079] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 450.784199][ T1981] usb 5-1: New USB device found, idVendor=2770, idProduct=9052, bcdDevice=cb.32 [ 450.793657][ T1981] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 450.821332][T13081] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 450.898592][ T1981] usb 5-1: config 0 descriptor?? [ 450.985793][ T1981] gspca_main: sq905c-2.14.0 probing 2770:9052 [ 451.376216][T13089] loop0: detected capacity change from 0 to 1024 [ 451.392645][ T1981] gspca_sq905c: sq905c_read: usb_control_msg failed (-71) [ 451.399886][ T1981] sq905c 5-1:0.0: Reading version command failed [ 451.404176][T13089] EXT4-fs (loop0): Test dummy encryption mode enabled [ 451.406863][ T1981] sq905c: probe of 5-1:0.0 failed with error -71 [ 451.414088][T13089] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 451.439730][T13089] EXT4-fs (loop0): orphan cleanup on readonly fs [ 451.446544][T13089] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 451.458166][T13089] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 451.484283][ T1981] usb 5-1: USB disconnect, device number 32 13:28:35 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xaa, 0xc5, 0x1d, 0x20, 0x2770, 0x9052, 0xcb32, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x54, 0x7d, 0xbd}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) 13:28:35 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0xc503, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:35 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) 13:28:35 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0xcc020000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x7a00, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x800da, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 452.180645][T13105] loop0: detected capacity change from 0 to 1024 [ 452.339403][T13105] EXT4-fs (loop0): Test dummy encryption mode enabled [ 452.388224][T13113] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 452.417544][T13105] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 452.474940][T13114] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 452.487721][T13105] EXT4-fs (loop0): orphan cleanup on readonly fs [ 452.494506][T13105] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 452.505840][T13105] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:28:36 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0xd8020000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:36 executing program 5: bind$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) 13:28:36 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0xcc02, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x8100, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 452.867116][T11031] usb 5-1: new high-speed USB device number 33 using dummy_hcd 13:28:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x800db, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 453.122729][T11031] usb 5-1: Using ep0 maxpacket: 32 13:28:36 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000002, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 453.255668][T11031] usb 5-1: New USB device found, idVendor=2770, idProduct=9052, bcdDevice=cb.32 [ 453.265147][T11031] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 453.343554][T11031] usb 5-1: config 0 descriptor?? [ 453.375289][T13129] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 453.398964][T11031] gspca_main: sq905c-2.14.0 probing 2770:9052 [ 453.459368][T13132] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 453.728025][T13135] loop0: detected capacity change from 0 to 1024 [ 453.822930][T11031] gspca_sq905c: sq905c_read: usb_control_msg failed (-71) [ 453.830248][T11031] sq905c 5-1:0.0: Reading version command failed [ 453.837204][T11031] sq905c: probe of 5-1:0.0 failed with error -71 [ 453.853595][T11031] usb 5-1: USB disconnect, device number 33 [ 453.863936][T13135] EXT4-fs (loop0): Test dummy encryption mode enabled [ 453.922745][T13135] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 453.970241][T13135] EXT4-fs (loop0): orphan cleanup on readonly fs [ 453.976886][T13135] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 453.988411][T13135] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:28:38 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xaa, 0xc5, 0x1d, 0x20, 0x2770, 0x9052, 0xcb32, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x54, 0x7d, 0xbd}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000400)={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 13:28:38 executing program 5: bind$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) 13:28:38 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0xd802, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:38 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000003, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x8847, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x800dc, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 454.619588][T13154] loop0: detected capacity change from 0 to 1024 [ 454.627774][T13155] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 454.676253][T13159] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 454.708849][T13154] EXT4-fs (loop0): Test dummy encryption mode enabled [ 454.716681][T13154] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 454.733602][T13154] EXT4-fs (loop0): orphan cleanup on readonly fs [ 454.740089][T13154] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 454.751628][T13154] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:28:38 executing program 5: bind$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) 13:28:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x8848, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:38 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000004, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80158, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:28:38 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0xf902, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 455.340563][T13171] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 455.411911][T13174] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 455.443389][ T8485] usb 5-1: new high-speed USB device number 34 using dummy_hcd 13:28:39 executing program 5: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) [ 455.682405][ T8485] usb 5-1: Using ep0 maxpacket: 32 [ 455.700894][T13179] loop0: detected capacity change from 0 to 1024 [ 455.760593][T13179] EXT4-fs (loop0): Test dummy encryption mode enabled [ 455.771098][T13179] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 455.798078][T13179] EXT4-fs (loop0): orphan cleanup on readonly fs [ 455.805327][T13179] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 455.813782][ T8485] usb 5-1: New USB device found, idVendor=2770, idProduct=9052, bcdDevice=cb.32 [ 455.816751][T13179] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 455.826061][ T8485] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 456.059519][ T8485] usb 5-1: config 0 descriptor?? [ 456.116154][ T8485] gspca_main: sq905c-2.14.0 probing 2770:9052 [ 456.542759][ T8485] gspca_sq905c: sq905c_read: usb_control_msg failed (-71) [ 456.550016][ T8485] sq905c 5-1:0.0: Reading version command failed [ 456.557009][ T8485] sq905c: probe of 5-1:0.0 failed with error -71 [ 456.605267][ T8485] usb 5-1: USB disconnect, device number 34 13:28:40 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xaa, 0xc5, 0x1d, 0x20, 0x2770, 0x9052, 0xcb32, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x54, 0x7d, 0xbd}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000400)={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 13:28:40 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000008, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xd200, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:40 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x40000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80159, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:28:40 executing program 5: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) [ 457.330090][T13207] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 457.422839][T13212] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 457.521087][T13214] loop0: detected capacity change from 0 to 1024 13:28:41 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x200000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 457.703841][T13214] EXT4-fs (loop0): Test dummy encryption mode enabled [ 457.830831][T13214] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:28:41 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x5900001d, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 458.083261][T13214] EXT4-fs (loop0): orphan cleanup on readonly fs [ 458.089836][T13214] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 458.101380][T13214] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:28:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xde0d, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:41 executing program 5: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) [ 458.322695][T11031] usb 5-1: new high-speed USB device number 35 using dummy_hcd [ 458.572906][T11031] usb 5-1: Using ep0 maxpacket: 32 13:28:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80160, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 458.701724][T13231] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 458.714639][T11031] usb 5-1: New USB device found, idVendor=2770, idProduct=9052, bcdDevice=cb.32 [ 458.724074][T11031] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 458.811409][T13234] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 458.847930][T11031] usb 5-1: config 0 descriptor?? 13:28:42 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x1000000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 458.948794][T11031] gspca_main: sq905c-2.14.0 probing 2770:9052 [ 459.312345][T11031] gspca_sq905c: sq905c_read: usb_control_msg failed (-71) [ 459.319736][T11031] sq905c 5-1:0.0: Reading version command failed [ 459.326693][T11031] sq905c: probe of 5-1:0.0 failed with error -71 [ 459.465674][T13246] loop0: detected capacity change from 0 to 1024 [ 459.502960][T11031] usb 5-1: USB disconnect, device number 35 [ 459.628949][T13246] EXT4-fs (loop0): Test dummy encryption mode enabled [ 459.733474][T13246] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:28:43 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xaa, 0xc5, 0x1d, 0x20, 0x2770, 0x9052, 0xcb32, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x54, 0x7d, 0xbd}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000400)={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 459.791838][T13246] EXT4-fs (loop0): orphan cleanup on readonly fs [ 459.798642][T13246] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 459.810074][T13246] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:28:43 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x2000000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:43 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000061, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x34000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:43 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) 13:28:43 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80170, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 460.202445][T13260] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 460.262545][T13264] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:28:44 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000135, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:44 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) 13:28:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x400300, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 460.612769][ T8485] usb 5-1: new high-speed USB device number 36 using dummy_hcd 13:28:44 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x3000000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 460.759004][T13270] loop0: detected capacity change from 0 to 1024 [ 460.831177][T13270] EXT4-fs (loop0): Test dummy encryption mode enabled [ 460.853413][ T8485] usb 5-1: Using ep0 maxpacket: 32 [ 460.933928][T13270] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 460.974015][ T8485] usb 5-1: New USB device found, idVendor=2770, idProduct=9052, bcdDevice=cb.32 [ 460.983612][ T8485] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 461.008737][T13270] EXT4-fs (loop0): orphan cleanup on readonly fs [ 461.017582][T13270] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 461.029317][T13270] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 461.076516][T13279] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 461.098092][ T8485] usb 5-1: config 0 descriptor?? 13:28:44 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) [ 461.164861][ T8485] gspca_main: sq905c-2.14.0 probing 2770:9052 [ 461.206271][T13282] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:28:44 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000210, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 461.582798][ T8485] gspca_sq905c: sq905c_read: usb_control_msg failed (-71) [ 461.590146][ T8485] sq905c 5-1:0.0: Reading version command failed [ 461.597445][ T8485] sq905c: probe of 5-1:0.0 failed with error -71 [ 461.714020][ T8485] usb 5-1: USB disconnect, device number 36 13:28:45 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000294, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80171, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:28:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xe0ffff, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x4000000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:45 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) 13:28:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'geneve0\x00', 0x0}) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="050300c806023e0001d841a0c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a8816107d08f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0xa76eb84436, 0x0, 0x40ed) [ 462.457110][T13302] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 462.529631][T13307] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 462.598298][T13305] loop0: detected capacity change from 0 to 1024 13:28:46 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) [ 462.784902][T13305] EXT4-fs (loop0): Test dummy encryption mode enabled 13:28:46 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x590002a8, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 462.831205][T13305] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:28:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x8000000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 462.910674][T13305] EXT4-fs (loop0): orphan cleanup on readonly fs [ 462.917496][T13305] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 462.929037][T13305] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:28:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x1000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x10020000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:47 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0xe, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x9}]}, &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:28:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80204, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 463.595697][T13326] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 463.723666][T13328] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:28:47 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x590002cc, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:47 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x1d000000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:47 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) 13:28:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x2000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 464.145409][T13332] loop0: detected capacity change from 0 to 1025 [ 464.294301][T13332] EXT4-fs (loop0): Test dummy encryption mode enabled 13:28:48 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0xe, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x9}]}, &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 464.369744][T13332] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:28:48 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x590002d8, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 464.475007][T13332] EXT4-fs (loop0): orphan cleanup on readonly fs [ 464.481595][T13332] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 464.493172][T13332] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:28:48 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) [ 464.690531][T13345] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 464.778989][T13346] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:28:48 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x41000000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x8028e, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:28:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x3000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:48 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000300, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:48 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) 13:28:48 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0xe, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x9}]}, &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:28:49 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x59000000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 465.585887][T13358] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 465.625820][T13360] loop0: detected capacity change from 0 to 1025 [ 465.664225][T13363] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 465.723888][T13360] EXT4-fs (loop0): Test dummy encryption mode enabled [ 465.798875][T13360] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 465.871837][T13360] EXT4-fs (loop0): orphan cleanup on readonly fs [ 465.878769][T13360] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 465.890301][T13360] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:28:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x4000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:49 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x8028f, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:28:49 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0xe, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x9}]}, &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:28:49 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000378, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:49 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) 13:28:49 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x60010000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 466.561577][T13376] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 466.631042][T13378] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 466.848558][T13387] loop0: detected capacity change from 0 to 1025 13:28:50 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x78030000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x5000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:50 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59001002, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 467.031000][T13387] EXT4-fs (loop0): Test dummy encryption mode enabled 13:28:50 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) [ 467.102839][T13387] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:28:50 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) [ 467.170130][T13387] EXT4-fs (loop0): orphan cleanup on readonly fs [ 467.176884][T13387] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 467.188352][T13387] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:28:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x6000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x802a6, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:28:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x94020000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 467.784707][T13406] __nla_validate_parse: 2 callbacks suppressed [ 467.784777][T13406] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:28:51 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) [ 467.858418][T13407] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:28:51 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59001d00, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:51 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) 13:28:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x7000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 468.232764][T13411] loop0: detected capacity change from 0 to 1025 13:28:51 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) [ 468.351572][T13411] EXT4-fs (loop0): Test dummy encryption mode enabled [ 468.367080][T13411] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 468.396247][T13411] EXT4-fs (loop0): orphan cleanup on readonly fs [ 468.402869][T13411] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 468.414450][T13411] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:28:52 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 13:28:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x802a7, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:28:52 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0xc5030000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:52 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59002000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 469.048574][T13426] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 469.083250][T13427] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:28:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) [ 469.321448][T13433] loop0: detected capacity change from 0 to 1025 [ 469.475412][T13433] EXT4-fs (loop0): Test dummy encryption mode enabled 13:28:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x8000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 469.518234][T13433] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 469.582845][T13433] EXT4-fs (loop0): orphan cleanup on readonly fs [ 469.589421][T13433] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 469.600893][T13433] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:28:53 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x9}]}, &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 469.790028][T13443] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 469.810145][T13444] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:28:53 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0xcc020000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:53 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59003501, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x9000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x802f9, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:28:53 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) [ 470.467230][T13456] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:28:54 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x9}]}, &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 470.541239][T13458] loop0: detected capacity change from 0 to 1025 [ 470.563373][T13461] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:28:54 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0xd8020000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:54 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59006100, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 470.698117][T13458] EXT4-fs (loop0): Test dummy encryption mode enabled [ 470.757809][T13458] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:28:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xa000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:54 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) [ 470.852740][T13458] EXT4-fs (loop0): orphan cleanup on readonly fs [ 470.859232][T13458] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 470.870763][T13458] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:28:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80300, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 471.476526][T13476] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:28:55 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x9}]}, &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 471.615365][T13478] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:28:55 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59007803, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:55 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0xf9020000, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) 13:28:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xb000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 471.994841][T13480] loop0: detected capacity change from 0 to 1025 13:28:55 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0xe, 0x0, 0x0, &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 472.159247][T13480] EXT4-fs (loop0): Test dummy encryption mode enabled [ 472.257299][T13480] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 472.350226][T13480] EXT4-fs (loop0): orphan cleanup on readonly fs [ 472.357174][T13480] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 472.368647][T13480] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:28:56 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000002, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:56 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) 13:28:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x803c1, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:28:56 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0xe, 0x0, 0x0, &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 13:28:56 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59009402, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xc000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:56 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000003, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 473.176783][T13507] loop0: detected capacity change from 0 to 1025 13:28:56 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, 0x0, 0x0) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) [ 473.310363][T13507] EXT4-fs (loop0): Test dummy encryption mode enabled [ 473.382795][T13513] __nla_validate_parse: 2 callbacks suppressed [ 473.382866][T13513] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 473.392921][T13507] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 473.420729][T13514] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:28:57 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0xe, 0x0, 0x0, &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 13:28:57 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x5900a802, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 473.525784][T13507] EXT4-fs (loop0): orphan cleanup on readonly fs [ 473.532753][T13507] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 473.544647][T13507] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:28:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xd000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:57 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000004, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x803c5, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:28:57 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0xe, 0x3, &(0x7f0000000180)=@framed={{0x18, 0x2}}, &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 13:28:57 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) [ 474.353143][T13529] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:28:58 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x5900cc02, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:58 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000008, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 474.438463][T13530] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 474.568102][T13533] loop0: detected capacity change from 0 to 1025 [ 474.629973][T13533] EXT4-fs (loop0): Test dummy encryption mode enabled [ 474.748810][T13533] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 474.818810][T13533] EXT4-fs (loop0): orphan cleanup on readonly fs [ 474.825960][T13533] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 474.839671][T13533] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:28:58 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0xe, 0x3, &(0x7f0000000180)=@framed={{0x18, 0x2}}, &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 13:28:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xe000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:28:58 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) 13:28:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x803c7, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:28:59 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x5900d802, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:28:59 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x5900001d, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 475.576716][T13552] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 475.665153][T13554] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:28:59 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0xe, 0x3, &(0x7f0000000180)=@framed={{0x18, 0x2}}, &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 13:28:59 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) [ 475.865689][T13556] loop0: detected capacity change from 0 to 1025 13:28:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xf000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 475.958894][T13556] EXT4-fs (loop0): Test dummy encryption mode enabled [ 476.076594][T13556] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:28:59 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 476.186310][T13556] EXT4-fs (loop0): orphan cleanup on readonly fs [ 476.193244][T13556] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 476.204735][T13556] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:28:59 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0xe, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@call]}, &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:29:00 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) [ 476.435611][T13570] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 476.505824][T13571] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:29:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x803c9, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:00 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000041, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x10000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:00 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x2, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:00 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0xe, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@call]}, &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:29:00 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) [ 477.309462][T13584] loop0: detected capacity change from 0 to 1025 13:29:01 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000160, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 477.399335][T13584] EXT4-fs (loop0): Test dummy encryption mode enabled [ 477.484992][T13588] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 477.525590][T13584] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 477.561473][T13590] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:29:01 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0xe, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@call]}, &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 13:29:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x11000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 477.616043][T13584] EXT4-fs (loop0): orphan cleanup on readonly fs [ 477.622983][T13584] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 477.634557][T13584] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:01 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000210, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:01 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x3, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x803ca, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:01 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x20000800) 13:29:01 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0xe, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x9}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 13:29:02 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000294, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x12000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:02 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x4, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 478.685216][T13612] loop0: detected capacity change from 0 to 1025 [ 478.803401][T13612] EXT4-fs (loop0): Test dummy encryption mode enabled [ 478.893725][T13612] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 478.953242][T13619] __nla_validate_parse: 2 callbacks suppressed [ 478.953314][T13619] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 478.993057][T13612] EXT4-fs (loop0): orphan cleanup on readonly fs 13:29:02 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0xe, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x9}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 478.999556][T13612] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 479.011344][T13612] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x803cb, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:02 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x20000800) [ 479.166719][T13623] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:29:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x20000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:03 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x590002cc, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:03 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x8, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 479.773610][T13633] loop0: detected capacity change from 0 to 1025 13:29:03 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x20000800) [ 479.948022][T13633] EXT4-fs (loop0): Test dummy encryption mode enabled 13:29:03 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0xe, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x9}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) [ 480.033424][T13633] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 480.157641][T13633] EXT4-fs (loop0): orphan cleanup on readonly fs [ 480.166592][T13633] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 480.178426][T13633] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 480.281389][T13641] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 480.393021][T13643] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:29:04 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x1d, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x803cc, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:04 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x590002d8, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x24000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:04 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x84, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc01cf509, &(0x7f00000000c0)={0xffffffffffffffff, 0x3, 0x40}) ioctl$BTRFS_IOC_SET_FEATURES(0xffffffffffffffff, 0x40309439, &(0x7f00000001c0)={0x2, 0x0, 0x1}) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000740)=0x200, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x40, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8983, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) clock_adjtime(0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x0) r2 = epoll_create1(0x0) fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={@map, 0xffffffffffffffff, 0x11}, 0x10) syz_io_uring_setup(0x427d, &(0x7f0000000400)={0x0, 0xd886, 0x10}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000005c0), &(0x7f0000000600)) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x9d98}], 0xa, &(0x7f0000000200)=""/20, 0x14, 0xb01001f1}, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0xc63b9e35) 13:29:04 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x20000800) 13:29:04 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x59, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 481.124753][T13656] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 481.197003][T13658] loop0: detected capacity change from 0 to 1025 [ 481.223500][T13661] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 481.279719][T13658] EXT4-fs (loop0): Test dummy encryption mode enabled 13:29:04 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x590002f9, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 481.502624][T13658] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 481.600521][T13658] EXT4-fs (loop0): orphan cleanup on readonly fs [ 481.607814][T13658] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 481.619391][T13658] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x25000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:05 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000800) 13:29:05 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x61, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x803cd, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:05 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000300, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 482.410623][T13679] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 482.540456][T13683] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:29:06 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000800) 13:29:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x48000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:06 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x135, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 482.968234][T13688] loop0: detected capacity change from 0 to 1025 [ 483.087979][T13688] EXT4-fs (loop0): Test dummy encryption mode enabled [ 483.117554][T13688] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 483.140759][T13693] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 483.168703][T13688] EXT4-fs (loop0): orphan cleanup on readonly fs [ 483.175401][T13688] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 483.186879][T13688] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 483.248929][T13695] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:29:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f00000000c0), 0x109801, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0x8010500c, &(0x7f0000000080)) ioctl$SNDCTL_DSP_SYNC(r0, 0x5001, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000000)) 13:29:07 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000378, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x803ce, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:07 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20000800) 13:29:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x4c000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:07 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x210, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:07 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x590003c5, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 484.050544][T13710] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 484.167463][T13714] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:29:07 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20000800) [ 484.327088][T13716] loop0: detected capacity change from 0 to 1025 [ 484.607545][T13716] EXT4-fs (loop0): Test dummy encryption mode enabled 13:29:08 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x294, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 484.736824][T13716] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:29:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x60000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 484.847615][T13716] EXT4-fs (loop0): orphan cleanup on readonly fs [ 484.854565][T13716] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 484.866126][T13716] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:08 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59001002, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:08 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x2a8, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:08 executing program 4: creat(&(0x7f0000000200)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=', @ANYRESDEC=0xee00, @ANYBLOB="d1"]) 13:29:08 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20000800) 13:29:08 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x803cf, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 485.426705][T13731] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 485.539172][T13735] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:29:09 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x2cc, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:09 executing program 4: r0 = msgget(0x2, 0x0) msgsnd(r0, &(0x7f0000000600)={0x2}, 0x8, 0x0) msgrcv(r0, &(0x7f00000002c0)={0x0, ""/142}, 0x96, 0x2, 0x1000) 13:29:09 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59001d00, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 485.728798][T13737] 9p: Unknown access argument 00000000000000060928Ñ 13:29:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x65580000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 485.908881][T13744] loop0: detected capacity change from 0 to 1025 [ 485.984216][T13744] EXT4-fs (loop0): Test dummy encryption mode enabled 13:29:09 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x2d8, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x20000800) [ 486.067545][T13744] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 486.178664][T13744] EXT4-fs (loop0): orphan cleanup on readonly fs [ 486.185564][T13744] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 486.197005][T13744] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 486.332790][ T9626] Bluetooth: hci5: command 0x0406 tx timeout 13:29:10 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59002000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:10 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000000), 0x7fffffff, 0x0) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000080)={0xc0f0f000, 0x0, "88250bc87f7288cfe6e955cc88abe972ac2b7b3072e6efa717cfe3bbb4088130"}) [ 486.397111][T13758] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 486.466632][T13759] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:29:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x68000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80402, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:10 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x300, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:10 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x1, 0x20000800) 13:29:10 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59004100, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:10 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) [ 487.074264][T13771] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 487.120455][T13772] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:29:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x6c000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 487.622733][T13780] loop0: detected capacity change from 0 to 1026 13:29:11 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x378, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 487.799736][T13780] EXT4-fs (loop0): Test dummy encryption mode enabled [ 487.894650][T13780] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:29:11 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x1, 0x20000800) 13:29:11 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59006001, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 487.992196][T13780] EXT4-fs (loop0): orphan cleanup on readonly fs [ 487.998685][T13780] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 488.010204][T13780] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:11 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) [ 488.300171][T13792] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 488.383298][T13794] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:29:12 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80406, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:12 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x1002, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x74000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:12 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59007803, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:12 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x1, 0x20000800) 13:29:12 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) [ 489.138555][T13807] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 489.199046][T13809] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 489.223422][T13808] loop0: detected capacity change from 0 to 1026 [ 489.271882][T13808] EXT4-fs (loop0): Test dummy encryption mode enabled [ 489.396655][T13808] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:29:13 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x0) 13:29:13 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x1d00, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 489.441044][T13808] EXT4-fs (loop0): orphan cleanup on readonly fs [ 489.447790][T13808] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 489.459244][T13808] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:13 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x7a000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:13 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x0) 13:29:13 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59009402, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:13 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80500, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:13 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:13 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x2000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 490.133135][T13828] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 490.189163][T13829] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:29:14 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000015c0)=@l2tp, 0x80, 0x0}}], 0x2, 0x0) 13:29:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x80ffffff, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 490.480975][T13834] loop0: detected capacity change from 0 to 1026 13:29:14 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x3501, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x5900c503, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 490.586420][T13834] EXT4-fs (loop0): Test dummy encryption mode enabled [ 490.687163][T13834] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:29:14 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) [ 490.763179][T13834] EXT4-fs (loop0): orphan cleanup on readonly fs [ 490.769664][T13834] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 490.781107][T13834] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:14 executing program 5: syz_usb_connect(0x0, 0x35, &(0x7f0000000140)={{0x12, 0x1, 0x0, 0x0, 0xcd, 0x8b, 0x8, 0xaf0, 0x6971, 0x211d, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x23, 0x1, 0x0, 0x0, 0x71b19b1a1701c6a9, 0x0, [{{0x9, 0x4, 0xdf, 0x7, 0x1, 0x55, 0xa1, 0x4c, 0x0, [], [{{0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, [@generic={0x8, 0xb, "91b17890987f"}]}}]}}]}}]}}, 0x0) 13:29:14 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) [ 491.087272][T13848] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:29:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80600, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 491.142824][T13850] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:29:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x5900cc02, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:14 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x6100, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x81000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 491.702482][ T8485] usb 6-1: new high-speed USB device number 3 using dummy_hcd 13:29:15 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) [ 491.899923][T13865] loop0: detected capacity change from 0 to 1027 [ 491.942754][ T8485] usb 6-1: Using ep0 maxpacket: 8 13:29:15 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x7803, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 491.974661][T13868] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 492.005542][T13865] EXT4-fs (loop0): Test dummy encryption mode enabled 13:29:15 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x5900d802, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 492.033086][T13870] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 492.063511][ T8485] usb 6-1: config 0 has an invalid interface number: 223 but max is 0 [ 492.071840][ T8485] usb 6-1: config 0 has no interface number 0 [ 492.078753][ T8485] usb 6-1: config 0 interface 223 altsetting 7 has an invalid endpoint with address 0x0, skipping [ 492.089704][ T8485] usb 6-1: config 0 interface 223 has no altsetting 0 [ 492.121823][T13865] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 492.159709][T13865] EXT4-fs (loop0): orphan cleanup on readonly fs [ 492.166474][T13865] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 492.177966][T13865] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:15 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x88470000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 492.423602][ T8485] usb 6-1: New USB device found, idVendor=0af0, idProduct=6971, bcdDevice=21.1d [ 492.433219][ T8485] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 492.441368][ T8485] usb 6-1: Product: syz [ 492.445927][ T8485] usb 6-1: Manufacturer: syz [ 492.452757][ T8485] usb 6-1: SerialNumber: syz 13:29:16 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:16 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80604, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 492.624745][ T8485] usb 6-1: config 0 descriptor?? [ 492.665862][ T8485] hso 6-1:0.223: Not our interface [ 492.672617][ T8485] usb-storage 6-1:0.223: USB Mass Storage device detected [ 492.785164][T13885] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 492.869665][ T8485] usb 6-1: USB disconnect, device number 3 [ 492.901914][T13892] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 493.173405][T13898] loop0: detected capacity change from 0 to 1027 [ 493.213363][T13898] EXT4-fs (loop0): Test dummy encryption mode enabled [ 493.255923][T13898] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 493.304805][T13898] EXT4-fs (loop0): orphan cleanup on readonly fs [ 493.311281][T13898] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 493.322965][T13898] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 493.652270][ T8485] usb 6-1: new high-speed USB device number 4 using dummy_hcd [ 493.902800][ T8485] usb 6-1: Using ep0 maxpacket: 8 [ 494.022578][ T8485] usb 6-1: config 0 has an invalid interface number: 223 but max is 0 [ 494.030906][ T8485] usb 6-1: config 0 has no interface number 0 [ 494.037509][ T8485] usb 6-1: config 0 interface 223 altsetting 7 has an invalid endpoint with address 0x0, skipping [ 494.048489][ T8485] usb 6-1: config 0 interface 223 has no altsetting 0 [ 494.213239][ T8485] usb 6-1: New USB device found, idVendor=0af0, idProduct=6971, bcdDevice=21.1d [ 494.222853][ T8485] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 494.231009][ T8485] usb 6-1: Product: syz [ 494.235535][ T8485] usb 6-1: Manufacturer: syz [ 494.240262][ T8485] usb 6-1: SerialNumber: syz [ 494.260023][ T8485] usb 6-1: config 0 descriptor?? [ 494.306230][ T8485] hso 6-1:0.223: Not our interface [ 494.312961][ T8485] usb-storage 6-1:0.223: USB Mass Storage device detected 13:29:18 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:18 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x5900f902, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x88480000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:18 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:18 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x9402, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80700, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 494.407002][ T1981] usb 6-1: USB disconnect, device number 4 [ 494.664734][T13933] loop0: detected capacity change from 0 to 1027 [ 494.739544][T13933] EXT4-fs (loop0): Test dummy encryption mode enabled 13:29:18 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) [ 494.863149][T13941] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 494.884678][T13933] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 494.895549][T13942] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:29:18 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 494.975995][T13933] EXT4-fs (loop0): orphan cleanup on readonly fs [ 494.983170][T13933] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 494.994618][T13933] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:18 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0xa802, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:18 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x88a8ffff, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:19 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80900, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:19 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x2, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:19 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0xcc02, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:19 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) [ 495.800850][T13955] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 495.865478][T13956] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:29:19 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) [ 496.073273][T13959] loop0: detected capacity change from 0 to 1028 13:29:19 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x3, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x9effffff, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 496.194496][T13959] EXT4-fs (loop0): Test dummy encryption mode enabled [ 496.248437][T13959] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 496.318876][T13959] EXT4-fs (loop0): orphan cleanup on readonly fs [ 496.325696][T13959] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 496.337107][T13959] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:20 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:20 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0xd802, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:20 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x4, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:20 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80a00, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:20 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) [ 496.870891][T13977] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 496.929306][T13979] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:29:20 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xd2000000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:20 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x8, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 497.425456][T13988] loop0: detected capacity change from 0 to 1029 13:29:21 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x30000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 497.488558][T13988] EXT4-fs (loop0): Test dummy encryption mode enabled [ 497.496665][T13988] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 497.516002][T13988] EXT4-fs (loop0): orphan cleanup on readonly fs [ 497.522699][T13988] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 497.534747][T13988] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:21 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:21 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x1d, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:21 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:21 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80b00, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 497.959208][T14000] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 498.030422][T14001] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:29:21 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x40000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xde0d0000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:21 executing program 4: writev(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x2275, &(0x7f0000000340)) [ 498.488590][T14011] loop0: detected capacity change from 0 to 1029 13:29:22 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x200000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:22 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x41, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 498.675300][T14011] EXT4-fs (loop0): Test dummy encryption mode enabled [ 498.699103][T14011] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 498.748048][T14011] EXT4-fs (loop0): orphan cleanup on readonly fs [ 498.754706][T14011] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 498.766269][T14011] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:22 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:22 executing program 4: writev(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x2275, &(0x7f0000000340)) [ 498.934100][T14020] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 498.955282][T14021] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:29:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xf0ffffff, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:22 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80c00, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:23 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x1000000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:23 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x59, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:23 executing program 4: writev(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x2275, &(0x7f0000000340)) 13:29:23 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) [ 499.828417][T14036] loop0: detected capacity change from 0 to 1030 [ 499.889506][T14036] EXT4-fs (loop0): Test dummy encryption mode enabled 13:29:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xffffa888, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 499.941635][T14036] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 499.959461][T14036] EXT4-fs (loop0): orphan cleanup on readonly fs [ 499.966333][T14036] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 499.977898][T14036] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:23 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x2000000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:23 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80d00, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:24 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x160, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:24 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) [ 500.514699][T14051] __nla_validate_parse: 2 callbacks suppressed [ 500.514768][T14051] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:29:24 executing program 4: r0 = syz_open_dev$sg(0x0, 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) [ 500.622199][T14052] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:29:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xffffe000, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) [ 500.956603][T14061] loop0: detected capacity change from 0 to 1030 13:29:24 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x3000000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:24 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x210, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 501.028665][T14061] EXT4-fs (loop0): Test dummy encryption mode enabled [ 501.039468][T14061] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 501.116643][T14061] EXT4-fs (loop0): orphan cleanup on readonly fs [ 501.123410][T14061] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 501.134954][T14061] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:24 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) [ 501.326816][T14070] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 501.399250][T14071] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:29:25 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80de2, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:25 executing program 4: r0 = syz_open_dev$sg(0x0, 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xffffff7f, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:25 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x294, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:25 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x4000000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 501.986758][T14084] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 502.019525][T14085] loop0: detected capacity change from 0 to 1030 13:29:25 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) [ 502.056036][T14088] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 502.137578][T14085] EXT4-fs (loop0): Test dummy encryption mode enabled [ 502.215157][T14085] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:29:25 executing program 4: r0 = syz_open_dev$sg(0x0, 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) [ 502.296921][T14085] EXT4-fs (loop0): orphan cleanup on readonly fs [ 502.303522][T14085] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 502.314965][T14085] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xffffff80, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:26 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x2cc, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:26 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80de3, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:26 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x8000000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:26 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) [ 503.162796][T14104] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:29:26 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) [ 503.243105][T14105] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:29:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xffffff9e, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:27 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x2d8, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 503.606290][T14115] loop0: detected capacity change from 0 to 1030 13:29:27 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x10020000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:27 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:27 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) [ 504.028531][T14124] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 504.104061][T14126] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. 13:29:27 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x1d000000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xfffffff0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:28 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x2f9, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 505.164438][T14115] EXT4-fs (loop0): Test dummy encryption mode enabled [ 505.198647][T14115] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 505.227361][T14115] EXT4-fs: failed to create workqueue [ 505.233256][T14115] EXT4-fs (loop0): mount failed 13:29:28 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80de4, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:28 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:28 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x35010000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:28 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x300, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:28 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(0xffffffffffffffff, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="100000001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:29 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(0xffffffffffffffff, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000080), 0x4) [ 505.783206][T14155] loop0: detected capacity change from 0 to 1030 13:29:29 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x59000000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:29 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x378, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 505.909104][T14155] EXT4-fs (loop0): Test dummy encryption mode enabled 13:29:29 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) [ 506.024192][T14155] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:29:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000001a00010000000000000000000a"], 0x40}}, 0x0) [ 506.123251][T14155] EXT4-fs (loop0): orphan cleanup on readonly fs [ 506.129744][T14155] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 506.141153][T14155] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:29 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(0xffffffffffffffff, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:30 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80de7, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:30 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x61000000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="c00000001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:30 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x3c5, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:30 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:30 executing program 5: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) [ 507.083513][T14178] loop0: detected capacity change from 0 to 1030 [ 507.159551][T14178] EXT4-fs (loop0): Test dummy encryption mode enabled [ 507.167595][T14178] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 507.189579][T14178] EXT4-fs (loop0): orphan cleanup on readonly fs [ 507.198361][T14178] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 507.210494][T14178] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="c10e00001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:31 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x78030000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80e00, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:31 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(0xffffffffffffffff, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:31 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x1002, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:31 executing program 5: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="e03f03001a00010000000000000000000a"], 0x40}}, 0x0) [ 508.127210][T14203] loop0: detected capacity change from 0 to 1031 [ 508.227088][T14203] EXT4-fs (loop0): Test dummy encryption mode enabled 13:29:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400100201a00010000000000000000000a"], 0x40}}, 0x0) [ 508.345883][T14203] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 508.435782][T14203] EXT4-fs (loop0): orphan cleanup on readonly fs [ 508.442407][T14203] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 508.453922][T14203] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:32 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x1d00, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:32 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x94020000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:32 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80f00, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:32 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="00f0ff7f1a00010000000000000000000a"], 0x40}}, 0x0) 13:29:32 executing program 5: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:32 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x2000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:33 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0xa8020000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 509.501264][T14234] loop0: detected capacity change from 0 to 1031 [ 509.567341][T14234] EXT4-fs (loop0): Test dummy encryption mode enabled [ 509.623866][T14234] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 509.649564][T14234] EXT4-fs (loop0): orphan cleanup on readonly fs [ 509.658556][T14234] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 509.670355][T14234] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 509.859361][ T3119] ieee802154 phy0 wpan0: encryption failed: -22 [ 509.865930][ T3119] ieee802154 phy1 wpan1: encryption failed: -22 13:29:33 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:33 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="effdffff1a00010000000000000000000a"], 0x40}}, 0x0) 13:29:33 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0xcc020000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:33 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x81020, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:33 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(0xffffffffffffffff, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:33 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x4100, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:34 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:34 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400000001000010000000000000000000a"], 0x40}}, 0x0) 13:29:34 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0xd8020000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 510.991030][T14265] loop0: detected capacity change from 0 to 1032 [ 511.013564][T14265] EXT4-fs (loop0): Test dummy encryption mode enabled [ 511.021506][T14265] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 511.041630][T14265] EXT4-fs (loop0): orphan cleanup on readonly fs [ 511.048321][T14265] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 511.059759][T14265] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:34 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x6001, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:34 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(0xffffffffffffffff, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:35 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500), 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:35 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x81100, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 511.439106][T14275] __nla_validate_parse: 2 callbacks suppressed [ 511.439174][T14275] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.2'. [ 511.563162][T14278] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.2'. 13:29:35 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x7803, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:35 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0x1002, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:35 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400200001a00010000000000000000000a"], 0x40}}, 0x0) [ 512.021150][T14288] loop0: detected capacity change from 0 to 1032 [ 512.099882][T14288] EXT4-fs (loop0): Test dummy encryption mode enabled [ 512.107865][T14288] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:29:35 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(0xffffffffffffffff, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) [ 512.142812][T14288] EXT4-fs (loop0): orphan cleanup on readonly fs [ 512.149283][T14288] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 512.160762][T14288] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:35 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500), 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:35 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x9402, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:36 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x81200, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:36 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0x8403, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:36 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400300001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:36 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0xc503, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:36 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500), 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) [ 513.289020][T14315] loop0: detected capacity change from 0 to 1033 [ 513.354223][T14315] EXT4-fs (loop0): Test dummy encryption mode enabled [ 513.364539][T14315] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 513.385675][T14315] EXT4-fs (loop0): orphan cleanup on readonly fs [ 513.392536][T14315] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 13:29:37 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xa002, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 513.404036][T14315] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:37 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400400001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x81800, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:37 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0xcc02, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:37 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{0x0}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:37 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xa803, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400500001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:37 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) [ 514.294694][T14335] loop0: detected capacity change from 0 to 1036 [ 514.417219][T14335] EXT4-fs (loop0): Test dummy encryption mode enabled [ 514.512898][T14335] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 514.603903][T14335] EXT4-fs (loop0): orphan cleanup on readonly fs [ 514.610404][T14335] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 514.622295][T14335] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:38 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0xd802, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:38 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{0x0}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400600001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:38 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd803, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x81f00, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:38 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:39 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0xf902, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400700001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:39 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{0x0}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:39 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd804, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 515.688141][T14363] loop0: detected capacity change from 0 to 1039 [ 515.752807][T14363] EXT4-fs (loop0): Test dummy encryption mode enabled [ 515.853498][T14363] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:29:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) [ 515.972725][T14363] EXT4-fs (loop0): orphan cleanup on readonly fs [ 515.979211][T14363] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 515.990898][T14363] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:39 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x40000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:40 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd808, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400800001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:40 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x82000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:40 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:40 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400900001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:40 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x200000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:40 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:40 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd80a, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 517.299578][T14396] loop0: detected capacity change from 0 to 1040 13:29:40 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) [ 517.414047][T14396] EXT4-fs (loop0): Test dummy encryption mode enabled [ 517.510265][T14396] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 517.570670][T14396] EXT4-fs (loop0): orphan cleanup on readonly fs [ 517.577692][T14396] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 517.589117][T14396] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:41 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400a00001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:41 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x1000000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:41 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x82010, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:41 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:41 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd81d, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:41 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400b00001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:42 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x2000000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 518.689848][T14422] loop0: detected capacity change from 0 to 1040 [ 518.779896][T14422] EXT4-fs (loop0): Test dummy encryption mode enabled [ 518.875537][T14422] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:29:42 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 518.940861][T14422] EXT4-fs (loop0): orphan cleanup on readonly fs [ 518.947703][T14422] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 518.959160][T14422] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:42 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:42 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x3000000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x82100, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:42 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee0796", 0x17}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400c00001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:43 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:43 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x4000000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:43 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) [ 519.872985][T14448] loop0: detected capacity change from 0 to 1040 [ 519.950545][T14448] EXT4-fs (loop0): Test dummy encryption mode enabled [ 519.958614][T14448] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:29:43 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee0796", 0x17}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) [ 520.006080][T14448] EXT4-fs (loop0): orphan cleanup on readonly fs [ 520.012834][T14448] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 520.024246][T14448] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400d00001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:44 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x2, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x82500, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:44 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee0796", 0x17}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:44 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x8000000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:44 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:44 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400e00001a00010000000000000000000a"], 0x40}}, 0x0) [ 521.091341][T14472] loop0: detected capacity change from 0 to 1042 [ 521.157101][T14472] EXT4-fs (loop0): Test dummy encryption mode enabled [ 521.165615][T14472] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 521.186395][T14472] EXT4-fs (loop0): orphan cleanup on readonly fs [ 521.193497][T14472] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 521.205064][T14472] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:45 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x3, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x82e00, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:45 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41b", 0x23}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:45 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:45 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x10020000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400f00001a00010000000000000000000a"], 0x40}}, 0x0) [ 522.059856][T14489] loop0: detected capacity change from 0 to 1047 [ 522.129678][T14489] EXT4-fs (loop0): Test dummy encryption mode enabled [ 522.140920][T14489] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 522.166491][T14489] EXT4-fs (loop0): orphan cleanup on readonly fs 13:29:45 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x4, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 522.173246][T14489] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 522.184662][T14489] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:45 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x82f00, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:46 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41b", 0x23}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:46 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x1d000000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="401000001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:46 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x8, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 523.208517][T14511] loop0: detected capacity change from 0 to 1047 [ 523.328040][T14511] EXT4-fs (loop0): Test dummy encryption mode enabled [ 523.419251][T14511] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 523.486008][T14511] EXT4-fs (loop0): orphan cleanup on readonly fs [ 523.492711][T14511] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 523.505098][T14511] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:47 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="401100001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:47 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41b", 0x23}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:47 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x41000000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:47 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff), 0x0, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:47 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x1d, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:47 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x83000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="401200001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:48 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x59000000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:48 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43", 0x29}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:48 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, 0x0, 0x0) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) [ 524.716372][T14540] loop0: detected capacity change from 0 to 1048 13:29:48 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x59, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 524.884467][T14540] EXT4-fs (loop0): Test dummy encryption mode enabled [ 524.906438][T14540] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:29:48 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43", 0x29}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) [ 524.979580][T14540] EXT4-fs (loop0): orphan cleanup on readonly fs [ 524.986812][T14540] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 524.998220][T14540] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:48 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x60010000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="402400001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:48 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x83100, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:49 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, 0x0, 0x0) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:49 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x61, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:49 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43", 0x29}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="402500001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:49 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x78030000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 526.075916][T14565] loop0: detected capacity change from 0 to 1048 [ 526.168717][T14565] EXT4-fs (loop0): Test dummy encryption mode enabled [ 526.279444][T14565] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 526.355779][T14565] EXT4-fs (loop0): orphan cleanup on readonly fs [ 526.362925][T14565] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 526.374411][T14565] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="404800001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:50 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x135, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:50 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x94020000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:50 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e4", 0x2c}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:50 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, 0x0, 0x0) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:50 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x83200, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:50 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="404c00001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:50 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x210, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 527.320288][T14594] loop0: detected capacity change from 0 to 1049 [ 527.370296][T14594] EXT4-fs (loop0): Test dummy encryption mode enabled [ 527.378818][T14594] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 527.395242][T14594] EXT4-fs (loop0): orphan cleanup on readonly fs [ 527.401718][T14594] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 13:29:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0xc5030000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 527.413401][T14594] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:51 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e4", 0x2c}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:51 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x83300, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:51 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="406000001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:51 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x294, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0xcc020000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:51 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e4", 0x2c}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:51 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) [ 528.403503][T14616] loop0: detected capacity change from 0 to 1049 [ 528.473891][T14616] EXT4-fs (loop0): Test dummy encryption mode enabled [ 528.565680][T14616] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:29:52 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="406800001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:52 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x2a8, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 528.639150][T14616] EXT4-fs (loop0): orphan cleanup on readonly fs [ 528.645841][T14616] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 528.657316][T14616] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:52 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e462", 0x2d}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x83400, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:52 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0xd8020000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:52 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:52 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x2cc, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="406c00001a00010000000000000000000a"], 0x40}}, 0x0) [ 529.588631][T14641] loop0: detected capacity change from 0 to 1050 13:29:53 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e462", 0x2d}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) [ 529.642869][T14641] EXT4-fs (loop0): Test dummy encryption mode enabled [ 529.725758][T14641] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 529.760603][T14641] EXT4-fs (loop0): orphan cleanup on readonly fs [ 529.767274][T14641] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 529.779287][T14641] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:53 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0xf9020000, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:53 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x83500, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:53 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x2d8, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:53 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(0xffffffffffffffff, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="407400001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:54 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e462", 0x2d}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) [ 530.682737][T14662] loop0: detected capacity change from 0 to 1050 13:29:54 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0x1002, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 530.770030][T14662] EXT4-fs (loop0): Test dummy encryption mode enabled 13:29:54 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(0xffffffffffffffff, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) [ 530.856454][T14662] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:29:54 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x300, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 530.917342][T14662] EXT4-fs (loop0): orphan cleanup on readonly fs [ 530.924102][T14662] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 530.935612][T14662] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:54 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x83600, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:54 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="407a00001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:55 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x378, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:55 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(0xffffffffffffffff, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:55 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0x8403, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 531.897617][T14689] loop0: detected capacity change from 0 to 1051 [ 531.919922][T14689] EXT4-fs (loop0): Test dummy encryption mode enabled [ 531.928496][T14689] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:29:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="40d200001a00010000000000000000000a"], 0x40}}, 0x0) [ 531.944196][T14689] EXT4-fs (loop0): orphan cleanup on readonly fs [ 531.950683][T14689] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 531.962324][T14689] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:55 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xa002, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:55 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:55 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x1002, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:55 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:56 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x83700, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:56 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xa803, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:56 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400003001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:56 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x1d00, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 532.957177][T14712] loop0: detected capacity change from 0 to 1051 13:29:56 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) [ 533.090838][T14712] EXT4-fs (loop0): Test dummy encryption mode enabled [ 533.174559][T14712] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:29:56 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) [ 533.247384][T14712] EXT4-fs (loop0): orphan cleanup on readonly fs [ 533.253982][T14712] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 533.265433][T14712] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:56 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400005001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:57 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd803, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:57 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x2000, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:57 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x83f00, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:57 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:57 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400006001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:57 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd804, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 534.394805][T14744] loop0: detected capacity change from 0 to 1055 [ 534.437341][T14744] EXT4-fs (loop0): Test dummy encryption mode enabled 13:29:58 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000080), 0x4) [ 534.480012][T14744] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:29:58 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x3501, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:58 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) [ 534.640737][T14744] EXT4-fs (loop0): orphan cleanup on readonly fs [ 534.647535][T14744] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 534.659034][T14744] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:58 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400007001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:58 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x84000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:58 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd808, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:58 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:58 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x6100, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400009001a00010000000000000000000a"], 0x40}}, 0x0) 13:29:59 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000080), 0x4) [ 535.542216][T14770] loop0: detected capacity change from 0 to 1056 [ 535.565620][T14770] EXT4-fs (loop0): Test dummy encryption mode enabled [ 535.578297][T14770] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 535.609361][T14770] EXT4-fs (loop0): orphan cleanup on readonly fs [ 535.616168][T14770] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 535.627689][T14770] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:29:59 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:29:59 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd80a, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:59 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x84800, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:29:59 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x7803, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:29:59 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000080), 0x4) 13:29:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="40000a001a00010000000000000000000a"], 0x40}}, 0x0) [ 536.579498][T14792] loop0: detected capacity change from 0 to 1060 [ 536.617741][T14792] EXT4-fs (loop0): Test dummy encryption mode enabled 13:30:00 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) [ 536.626234][T14792] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 536.658307][T14792] EXT4-fs (loop0): orphan cleanup on readonly fs [ 536.665167][T14792] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 13:30:00 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd81d, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 536.677949][T14792] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:30:00 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, 0x0, 0x0) 13:30:00 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x9402, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="40000b001a00010000000000000000000a"], 0x40}}, 0x0) 13:30:00 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x84c00, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:30:00 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:30:01 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0x7fffffe, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:01 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, 0x0, 0x0) 13:30:01 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0xa802, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="40000c001a00010000000000000000000a"], 0x40}}, 0x0) [ 537.772512][T14818] loop0: detected capacity change from 0 to 1062 [ 537.851898][T14818] EXT4-fs (loop0): Test dummy encryption mode enabled [ 537.968756][T14818] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:30:01 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0xcc02, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:01 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x0, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 538.060704][T14818] EXT4-fs (loop0): orphan cleanup on readonly fs [ 538.067355][T14818] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 538.078984][T14818] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:30:01 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="40000d001a00010000000000000000000a"], 0x40}}, 0x0) 13:30:01 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) 13:30:02 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r0, 0x2) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, 0x0, 0x0) 13:30:02 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x85801, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:30:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="40de0d001a00010000000000000000000a"], 0x40}}, 0x0) 13:30:02 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0xd802, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:02 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x2, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:02 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, &(0x7f0000000340)) [ 539.258720][T14854] loop0: detected capacity change from 0 to 1068 13:30:03 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000440)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "0a1885", 0x8, 0x33, 0x0, @local, @private0, {[@srh={0x2c, 0x3}]}}}}}, 0x0) [ 539.381151][T14854] EXT4-fs (loop0): Test dummy encryption mode enabled [ 539.470967][T14854] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:30:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="40000e001a00010000000000000000000a"], 0x40}}, 0x0) [ 539.535356][T14854] EXT4-fs (loop0): orphan cleanup on readonly fs [ 539.541839][T14854] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 539.555906][T14854] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:30:03 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x30000, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:03 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x3, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:03 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x2275, &(0x7f0000000340)) 13:30:03 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="40000f001a00010000000000000000000a"], 0x40}}, 0x0) 13:30:03 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x85901, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:30:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x6b, 0x11, 0xb}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x70) 13:30:03 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x40000, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:04 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x4, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400011001a00010000000000000000000a"], 0x40}}, 0x0) 13:30:04 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x2275, &(0x7f0000000340)) [ 540.660241][T14879] loop0: detected capacity change from 0 to 1068 [ 540.791949][T14879] EXT4-fs (loop0): Test dummy encryption mode enabled [ 540.844409][T14879] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:30:04 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x28, 0x0, 0x0, 0x0) clone(0x700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0xfffff, 0xfffffffffffffffb) r1 = gettid() ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) tkill(r1, 0x0) [ 540.932793][T14879] EXT4-fs (loop0): orphan cleanup on readonly fs [ 540.939274][T14879] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 540.950799][T14879] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:30:04 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x4008012, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = dup(r1) setsockopt$ARPT_SO_SET_REPLACE(r2, 0xa02000000000000, 0x60, &(0x7f0000000840)={'filter\x00', 0x1002, 0x4802, 0x3d0, 0x5202, 0x0, 0x3d0, 0x2e8, 0x2e8, 0x2e8, 0x4, 0x0, {[{{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @empty, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_vlan\x00', 'tunl0\x00'}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28}}, {{@arp={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'netdevsim0\x00', 'ip6tnl0\x00'}, 0xc0, 0xf0}, @unspec=@CONNMARK={0x30}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@dev, @empty, @local, @loopback}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x420) [ 541.069790][T14890] Invalid option length (261) for dns_resolver key [ 541.094243][T14890] Invalid option length (261) for dns_resolver key 13:30:04 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x200000, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:04 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x85c00, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:30:05 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x2275, &(0x7f0000000340)) 13:30:05 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x8, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:05 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400012001a00010000000000000000000a"], 0x40}}, 0x0) [ 541.942709][T14911] loop0: detected capacity change from 0 to 1070 13:30:05 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x1d, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:05 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x1000000, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:05 executing program 5: add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, &(0x7f0000000080)="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", 0x401, 0xfffffffffffffffc) [ 542.087869][T14911] EXT4-fs (loop0): Test dummy encryption mode enabled [ 542.126995][T14911] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 542.175057][T14911] EXT4-fs (loop0): orphan cleanup on readonly fs [ 542.181532][T14911] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 542.193092][T14911] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:30:05 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, 0x0) 13:30:05 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x2000000, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400020001a00010000000000000000000a"], 0x40}}, 0x0) 13:30:06 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x86000, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:30:06 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x41, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:06 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000800)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) syz_open_procfs(0x0, 0x0) 13:30:06 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x3000000, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:06 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, 0x0) [ 543.130620][T14938] loop0: detected capacity change from 0 to 1072 [ 543.192560][T14938] EXT4-fs (loop0): Test dummy encryption mode enabled [ 543.244874][T14938] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 13:30:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400024001a00010000000000000000000a"], 0x40}}, 0x0) [ 543.319930][T14938] EXT4-fs (loop0): orphan cleanup on readonly fs [ 543.326522][T14938] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 543.338305][T14938] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:30:07 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x59, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:07 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="ae88bff8241000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x2275, 0x0) 13:30:07 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x4000000, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x8188aea6, &(0x7f0000001a40)={"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"}) 13:30:07 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x86001, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:30:07 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400025001a00010000000000000000000a"], 0x40}}, 0x0) 13:30:07 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x160, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:08 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x8000000, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:08 executing program 4: syz_io_uring_setup(0x7932, &(0x7f0000000040), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) syz_io_uring_submit(r0, 0x0, &(0x7f0000000140)=@IORING_OP_READ_FIXED, 0xfffff6b7) syz_io_uring_setup(0x668c, &(0x7f00000003c0), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000480), &(0x7f00000004c0)) [ 544.593077][T14972] loop0: detected capacity change from 0 to 1072 [ 544.703422][T14972] EXT4-fs (loop0): Test dummy encryption mode enabled 13:30:08 executing program 5: syz_emit_ethernet(0x37, &(0x7f0000000180)={@local, @multicast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x29, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x6}, {'\"'}}}}}}, 0x0) [ 544.787650][T14972] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 544.840484][T14972] EXT4-fs (loop0): orphan cleanup on readonly fs [ 544.847499][T14972] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 544.858935][T14972] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:30:08 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x210, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="408847001a00010000000000000000000a"], 0x40}}, 0x0) 13:30:08 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x10020000, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:09 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x86800, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:30:09 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)=ANY=[@ANYBLOB="1201000059965240450c3061887c000000010902120001000000000904"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000600)={0x2c, &(0x7f0000000680)=ANY=[], 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000380)={0x0, 0x0, 0x1, "12"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) 13:30:09 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x294, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:09 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_open_dev$vcsn(&(0x7f0000000040), 0x1f, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000001c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000340)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6}, 0xd8) setsockopt$inet_int(r1, 0x0, 0x21, &(0x7f0000000000)=0xa77d, 0x4) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200187ac, &(0x7f0000000300)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[], 0xfea7) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e22, @local}, 0x10) r2 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000001c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000340)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6}, 0xd8) setsockopt$inet_int(r2, 0x0, 0x21, &(0x7f0000000000), 0x4) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200187ac, &(0x7f0000000300)={0x2, 0x4e23, @local}, 0x10) 13:30:09 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x1d000000, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400048001a00010000000000000000000a"], 0x40}}, 0x0) [ 546.093193][T15004] loop0: detected capacity change from 0 to 1076 [ 546.143875][T15004] EXT4-fs (loop0): Test dummy encryption mode enabled [ 546.243785][T15004] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 546.299565][T15010] syz-executor.5 uses obsolete (PF_INET,SOCK_PACKET) [ 546.342294][ T1981] usb 5-1: new high-speed USB device number 37 using dummy_hcd [ 546.357492][T15004] EXT4-fs (loop0): orphan cleanup on readonly fs [ 546.364190][T15004] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 546.375966][T15004] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:30:10 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x2cc, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 546.732487][ T1981] usb 5-1: New USB device found, idVendor=0c45, idProduct=6130, bcdDevice=7c.88 [ 546.741736][ T1981] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 13:30:10 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x86c00, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:30:10 executing program 5: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet(0x2, 0x3, 0x5) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000080)) [ 546.829549][ T1981] usb 5-1: config 0 descriptor?? 13:30:10 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x35010000, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 546.890231][ T1981] gspca_main: sonixj-2.14.0 probing 0c45:6130 13:30:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="408848001a00010000000000000000000a"], 0x40}}, 0x0) [ 547.289254][T15034] loop0: detected capacity change from 0 to 1078 [ 547.350567][T15034] EXT4-fs (loop0): Test dummy encryption mode enabled 13:30:11 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x2d8, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000002a80)={0x0, 0x0, &(0x7f0000002a40)={&(0x7f00000007c0)=ANY=[@ANYBLOB="4000000019000b0f00000000000000000a"], 0x40}}, 0x0) [ 547.475582][T15034] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 547.536812][T15034] EXT4-fs (loop0): orphan cleanup on readonly fs [ 547.545714][T15034] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 547.557504][T15034] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 547.738425][T15041] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 549.092421][ T1981] gspca_sonixj: reg_r err -71 [ 549.097584][ T1981] sonixj: probe of 5-1:0.0 failed with error -71 [ 549.115306][ T1981] usb 5-1: USB disconnect, device number 37 [ 549.862622][T11031] usb 5-1: new high-speed USB device number 38 using dummy_hcd [ 550.273218][T11031] usb 5-1: New USB device found, idVendor=0c45, idProduct=6130, bcdDevice=7c.88 [ 550.283037][T11031] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 550.357814][T11031] usb 5-1: config 0 descriptor?? 13:30:14 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)=ANY=[@ANYBLOB="1201000059965240450c3061887c000000010902120001000000000904"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000600)={0x2c, &(0x7f0000000680)=ANY=[], 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000380)={0x0, 0x0, 0x1, "12"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) 13:30:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="40004c001a00010000000000000000000a"], 0x40}}, 0x0) 13:30:14 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x59000000, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x87001, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) 13:30:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000000000)=0x400, 0x4) syz_emit_ethernet(0xf9, &(0x7f0000000340)={@local, @empty, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0xc3, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x40000000000000b8, 0x0, 0x0, 0x0, 0x0, {[@exp_fastopen={0xfe, 0x0, 0xf989, "c6f06733afbd9f2a"}, @timestamp, @mss, @nop, @fastopen={0x22, 0x0, "fe19dadfcbcb89"}, @mptcp=@mp_fclose, @timestamp, @timestamp]}}, {"dfa3219a06fb1bb2e4488412ec7db1c7c759c401291d8bc313add1e0c8da3131836a552049b8e49e781f03c59e109f3491c7602697122cfeec4546637b1de4709e69b915ae41af75d98186069b7b1806d3d7396f8f87b6db39b883b4bed050cd645be683d9222aa5622863376f140e21309f94c11533d197f5fd27e3b86dedcd971e82bc3511c168f9d8a2e0784b41131c8350ba4e92b0ec8355d443e2f89578b05cfdb53a02de8300000000000000"}}}}}}}, 0x0) 13:30:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x2f9, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 550.467628][T11031] usb 5-1: can't set config #0, error -71 [ 550.530148][T11031] usb 5-1: USB disconnect, device number 38 [ 550.631490][T15080] loop0: detected capacity change from 0 to 1080 [ 550.807767][T15080] EXT4-fs (loop0): Test dummy encryption mode enabled [ 550.843908][T15080] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 550.888009][T15080] EXT4-fs (loop0): orphan cleanup on readonly fs [ 550.894876][T15080] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 550.906329][T15080] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. 13:30:14 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xd, 0x3, &(0x7f0000000280)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x31, 0x57}}, &(0x7f0000000140)='GPL\x00', 0x1, 0xfc76, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)}, 0x48) 13:30:14 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x61000000, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:14 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x300, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="406558001a00010000000000000000000a"], 0x40}}, 0x0) 13:30:14 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x87101, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 551.292531][T11031] usb 5-1: new high-speed USB device number 39 using dummy_hcd 13:30:15 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x378, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) [ 551.673534][T11031] usb 5-1: New USB device found, idVendor=0c45, idProduct=6130, bcdDevice=7c.88 [ 551.682899][T11031] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 551.773919][T11031] usb 5-1: config 0 descriptor?? [ 551.832846][T11031] gspca_main: sonixj-2.14.0 probing 0c45:6130 [ 551.910137][T15111] loop0: detected capacity change from 0 to 1080 [ 551.983805][T15111] EXT4-fs (loop0): Test dummy encryption mode enabled [ 552.025067][T15111] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 552.109088][T15111] EXT4-fs (loop0): orphan cleanup on readonly fs [ 552.116004][T15111] EXT4-fs error (device loop0): ext4_orphan_get:1412: comm syz-executor.0: bad orphan inode 4278190080 [ 552.127496][T15111] EXT4-fs (loop0): mounted filesystem without journal. Opts: test_dummy_encryption,,errors=continue. Quota mode: writeback. [ 554.013142][T11031] gspca_sonixj: reg_r err -71 [ 554.018114][T11031] sonixj: probe of 5-1:0.0 failed with error -71 [ 554.036315][T11031] usb 5-1: USB disconnect, device number 39 13:30:18 executing program 4: r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)=ANY=[@ANYBLOB="1201000059965240450c3061887c000000010902120001000000000904"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000600)={0x2c, &(0x7f0000000680)=ANY=[], 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x2c, &(0x7f0000000380)={0x0, 0x0, 0x1, "12"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) 13:30:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="280e003f4305607e5bc5795e6558", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) 13:30:18 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="400060001a00010000000000000000000a"], 0x40}}, 0x0) 13:30:18 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x78030000, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x294, 0x2, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:18 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@raw={'raw\x00', 0x3c1, 0x3, 0x394, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x2cc, 0x378, 0x378, 0x2cc, 0x378, 0xd802, 0x0, {[{{@uncond, 0x3c5, 0x1c0, 0x208, 0x52020000, {}, [@common=@unspec=@pkttype={{0x28}}, @common=@inet=@recent0={{0xf4}, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}, {{@ipv6={@empty, @local, [], [], 'bridge_slave_1\x00', 'virt_wifi0\x00'}, 0x0, 0xa4, 0xc4}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x2d) 13:30:18 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x87400, 0x4, &(0x7f0000000180)=[{&(0x7f0000010000)="20000000ac00000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000ff6856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000200)={[{@test_dummy_encryption}]}) [ 554.939089][T15148] =====================================================