nk={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) [ 716.196289][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:44:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:44:19 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) recvmsg$unix(r0, 0x0, 0x0) 03:44:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000880), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000001ac0)={'wlan0\x00'}) sendmsg$NL80211_CMD_SET_STATION(r1, &(0x7f0000001bc0)={0x0, 0x0, 0x0}, 0x0) 03:44:19 executing program 1: prctl$PR_GET_IO_FLUSHER(0x3b) 03:44:19 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0xa, &(0x7f00000001c0)=@raw=[@map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1}, @exit, @jmp={0x5, 0x1, 0xa, 0x6, 0x7, 0x1, 0x10}, @ldst={0x1, 0x3, 0x3, 0xa, 0x6, 0xc, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x7ff}, @jmp={0x5, 0x1, 0xe94e4d4aa3cc7b73, 0x9, 0x4, 0xffffffffffffffc0, 0xc}], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xc0, &(0x7f00000000c0)=""/192, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) syz_open_dev$vcsu(&(0x7f0000000180), 0x80000001, 0x22000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:19 executing program 0: openat$nvram(0xffffffffffffff9c, &(0x7f0000000880), 0x40102, 0x0) 03:44:19 executing program 0: syz_open_dev$vcsa(&(0x7f0000000c00), 0x0, 0x2c0880) 03:44:19 executing program 1: openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) getrusage(0x1, &(0x7f0000000540)) 03:44:19 executing program 5: r0 = socket(0x11, 0x2, 0x0) bind$tipc(r0, 0x0, 0x0) 03:44:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000880), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000001ac0)={'wlan0\x00'}) sendmsg$NL80211_CMD_SET_STATION(r1, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000001b80)={0x0}}, 0x0) 03:44:19 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0xa, &(0x7f00000001c0)=@raw=[@map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1}, @exit, @jmp={0x5, 0x1, 0xa, 0x6, 0x7, 0x1, 0x10}, @ldst={0x1, 0x3, 0x3, 0xa, 0x6, 0xc, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x7ff}, @jmp={0x5, 0x1, 0xe94e4d4aa3cc7b73, 0x9, 0x4, 0xffffffffffffffc0, 0xc}], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xc0, &(0x7f00000000c0)=""/192, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) syz_open_dev$vcsu(&(0x7f0000000180), 0x80000001, 0x22000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:19 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) [ 717.355652][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:44:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:44:20 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x0, 0x0}) 03:44:20 executing program 1: faccessat2(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:44:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000880), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000001ac0)={'wlan0\x00'}) sendmsg$NL80211_CMD_SET_STATION(r1, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000001b80)={0x0}}, 0x0) 03:44:20 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0xa, &(0x7f00000001c0)=@raw=[@map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1}, @exit, @jmp={0x5, 0x1, 0xa, 0x6, 0x7, 0x1, 0x10}, @ldst={0x1, 0x3, 0x3, 0xa, 0x6, 0xc, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x7ff}, @jmp={0x5, 0x1, 0xe94e4d4aa3cc7b73, 0x9, 0x4, 0xffffffffffffffc0, 0xc}], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xc0, &(0x7f00000000c0)=""/192, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) syz_open_dev$vcsu(&(0x7f0000000180), 0x80000001, 0x22000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:20 executing program 0: syz_mount_image$ext4(&(0x7f00000002c0)='ext3\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x0, &(0x7f0000000480)={[{@quota}]}) [ 718.147418][T16311] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 03:44:20 executing program 5: getegid() getegid() shmctl$IPC_RMID(0xffffffffffffffff, 0x0) fork() shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000080)=""/246) syz_genetlink_get_family_id$netlbl_calipso(0x0, 0xffffffffffffffff) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), 0x802004, 0x0) [ 718.229422][T16311] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 03:44:20 executing program 1: rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000040)) 03:44:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000880), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000001ac0)={'wlan0\x00'}) sendmsg$NL80211_CMD_SET_STATION(r1, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000001b80)={0x0}}, 0x0) 03:44:20 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0xa, &(0x7f00000001c0)=@raw=[@map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1}, @exit, @jmp={0x5, 0x1, 0xa, 0x6, 0x7, 0x1, 0x10}, @ldst={0x1, 0x3, 0x3, 0xa, 0x6, 0xc, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x7ff}, @jmp={0x5, 0x1, 0xe94e4d4aa3cc7b73, 0x9, 0x4, 0xffffffffffffffc0, 0xc}], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xc0, &(0x7f00000000c0)=""/192, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) syz_open_dev$vcsu(&(0x7f0000000180), 0x80000001, 0x22000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:20 executing program 0: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000000)) ioctl$NS_GET_OWNER_UID(r0, 0x541b, &(0x7f0000000180)) 03:44:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000880), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000001ac0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r1, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000001b80)={&(0x7f0000001b00)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_STA_SUPPORT_P2P_PS={0x5}]}, 0x24}}, 0x0) [ 718.631932][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:44:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:44:21 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0xa, &(0x7f00000001c0)=@raw=[@map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1}, @exit, @jmp={0x5, 0x1, 0xa, 0x6, 0x7, 0x1, 0x10}, @ldst={0x1, 0x3, 0x3, 0xa, 0x6, 0xc, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x7ff}, @jmp={0x5, 0x1, 0xe94e4d4aa3cc7b73, 0x9, 0x4, 0xffffffffffffffc0, 0xc}], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xc0, &(0x7f00000000c0)=""/192, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) syz_open_dev$vcsu(&(0x7f0000000180), 0x80000001, 0x22000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:21 executing program 1: r0 = socket(0x29, 0x2, 0x0) bind$tipc(r0, 0x0, 0x0) 03:44:21 executing program 5: select(0x40, &(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000000100)) 03:44:21 executing program 0: socket(0x2b, 0x1, 0x6b01) 03:44:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000880), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000001ac0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r1, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000001b80)={&(0x7f0000001b00)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_STA_SUPPORT_P2P_PS={0x5}]}, 0x24}}, 0x0) 03:44:21 executing program 1: r0 = gettid() r1 = fork() rt_tgsigqueueinfo(r0, r1, 0x2, &(0x7f0000000040)={0x0, 0x0, 0x7ffffffc}) 03:44:21 executing program 5: read$FUSE(0xffffffffffffffff, 0x0, 0x0) fork() recvmsg$unix(0xffffffffffffffff, &(0x7f000000efc0)={0x0, 0x0, 0x0, 0x0, &(0x7f000000ef40)}, 0x2001) read$FUSE(0xffffffffffffffff, 0x0, 0x0) getgroups(0x0, 0x0) openat$nvme_fabrics(0xffffffffffffff9c, 0x0, 0x8000, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) 03:44:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000880), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000001ac0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r1, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000001b80)={&(0x7f0000001b00)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_STA_SUPPORT_P2P_PS={0x5}]}, 0x24}}, 0x0) 03:44:21 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0xa, &(0x7f00000001c0)=@raw=[@map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1}, @exit, @jmp={0x5, 0x1, 0xa, 0x6, 0x7, 0x1, 0x10}, @ldst={0x1, 0x3, 0x3, 0xa, 0x6, 0xc, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x7ff}, @jmp={0x5, 0x1, 0xe94e4d4aa3cc7b73, 0x9, 0x4, 0xffffffffffffffc0, 0xc}], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xc0, &(0x7f00000000c0)=""/192, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) syz_open_dev$vcsu(&(0x7f0000000180), 0x80000001, 0x22000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:21 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000000280)={&(0x7f0000000180), 0xc, 0x0}, 0x0) 03:44:21 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000880), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000001ac0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000001b80)={&(0x7f0000001b00)={0x24, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_STA_SUPPORT_P2P_PS={0x5}]}, 0x24}}, 0x0) [ 719.427274][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:44:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:44:22 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0xa, &(0x7f00000001c0)=@raw=[@map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1}, @exit, @jmp={0x5, 0x1, 0xa, 0x6, 0x7, 0x1, 0x10}, @ldst={0x1, 0x3, 0x3, 0xa, 0x6, 0xc, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x7ff}, @jmp={0x5, 0x1, 0xe94e4d4aa3cc7b73, 0x9, 0x4, 0xffffffffffffffc0, 0xc}], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xc0, &(0x7f00000000c0)=""/192, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) syz_open_dev$vcsu(&(0x7f0000000180), 0x80000001, 0x22000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:22 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 03:44:22 executing program 5: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x2) 03:44:22 executing program 1: prctl$PR_GET_IO_FLUSHER(0x29) 03:44:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000880), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000001ac0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000001b80)={&(0x7f0000001b00)={0x24, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_STA_SUPPORT_P2P_PS={0x5}]}, 0x24}}, 0x0) 03:44:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000880), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000001ac0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000001b80)={&(0x7f0000001b00)={0x24, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_STA_SUPPORT_P2P_PS={0x5}]}, 0x24}}, 0x0) 03:44:22 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/cgroup\x00') ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x40305839, 0x0) 03:44:22 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0xa, &(0x7f00000001c0)=@raw=[@map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1}, @exit, @jmp={0x5, 0x1, 0xa, 0x6, 0x7, 0x1, 0x10}, @ldst={0x1, 0x3, 0x3, 0xa, 0x6, 0xc, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x7ff}, @jmp={0x5, 0x1, 0xe94e4d4aa3cc7b73, 0x9, 0x4, 0xffffffffffffffc0, 0xc}], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xc0, &(0x7f00000000c0)=""/192, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) syz_open_dev$vcsu(&(0x7f0000000180), 0x80000001, 0x22000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:22 executing program 0: r0 = socket(0x2, 0x3, 0x100) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x4002081) 03:44:22 executing program 5: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) close(r0) 03:44:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000880), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000001ac0)={'wlan0\x00'}) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000001b80)={&(0x7f0000001b00)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_STA_SUPPORT_P2P_PS={0x5}]}, 0x24}}, 0x0) [ 720.157018][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:44:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:44:22 executing program 1: socketpair(0x6, 0x0, 0x0, &(0x7f0000000080)) 03:44:22 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0xa, &(0x7f00000001c0)=@raw=[@map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1}, @exit, @jmp={0x5, 0x1, 0xa, 0x6, 0x7, 0x1, 0x10}, @ldst={0x1, 0x3, 0x3, 0xa, 0x6, 0xc, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x7ff}, @jmp={0x5, 0x1, 0xe94e4d4aa3cc7b73, 0x9, 0x4, 0xffffffffffffffc0, 0xc}], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xc0, &(0x7f00000000c0)=""/192, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) syz_open_dev$vcsu(&(0x7f0000000180), 0x80000001, 0x22000) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:22 executing program 0: setresgid(0x0, 0xee01, 0x0) shmctl$IPC_RMID(0xffffffffffffffff, 0x0) fork() 03:44:22 executing program 5: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000740), 0x0, 0x0) 03:44:22 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000880), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000001ac0)={'wlan0\x00'}) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000001b80)={&(0x7f0000001b00)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_STA_SUPPORT_P2P_PS={0x5}]}, 0x24}}, 0x0) 03:44:23 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0xa, &(0x7f00000001c0)=@raw=[@map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1}, @exit, @jmp={0x5, 0x1, 0xa, 0x6, 0x7, 0x1, 0x10}, @ldst={0x1, 0x3, 0x3, 0xa, 0x6, 0xc, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x7ff}, @jmp={0x5, 0x1, 0xe94e4d4aa3cc7b73, 0x9, 0x4, 0xffffffffffffffc0, 0xc}], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xc0, &(0x7f00000000c0)=""/192, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) syz_open_dev$vcsu(&(0x7f0000000180), 0x80000001, 0x22000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:23 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x54}, 0x1, 0x0, 0x7}, 0x0) 03:44:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000880), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000001ac0)={'wlan0\x00'}) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000001b80)={&(0x7f0000001b00)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_STA_SUPPORT_P2P_PS={0x5}]}, 0x24}}, 0x0) 03:44:23 executing program 5: fork() syz_genetlink_get_family_id$netlbl_calipso(0x0, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f00000002c0)='ext3\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, &(0x7f0000000440), 0x802004, &(0x7f0000000480)) 03:44:23 executing program 0: socketpair(0x2, 0x0, 0x5aa, &(0x7f0000000080)) 03:44:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000880), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000001ac0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000001b80)={&(0x7f0000001b00)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}}, 0x1c}}, 0x0) [ 721.004371][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:44:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:44:23 executing program 1: openat$adsp1(0xffffffffffffff9c, 0x0, 0x18b801, 0x0) 03:44:23 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0xa, &(0x7f00000001c0)=@raw=[@map_val={0x18, 0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, 0x1}, @exit, @jmp={0x5, 0x1, 0xa, 0x6, 0x7, 0x1, 0x10}, @ldst={0x1, 0x3, 0x3, 0xa, 0x6, 0xc, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x7ff}, @jmp={0x5, 0x1, 0xe94e4d4aa3cc7b73, 0x9, 0x4, 0xffffffffffffffc0, 0xc}], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xc0, &(0x7f00000000c0)=""/192, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:23 executing program 0: timer_create(0x0, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}}, 0x0) 03:44:23 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x64, 0x0, 0x0, 0x55}]}) 03:44:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000880), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000001ac0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000001b80)={&(0x7f0000001b00)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}}, 0x1c}}, 0x0) 03:44:23 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/module/bcm203x', 0x200000, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) 03:44:24 executing program 5: waitid(0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)) 03:44:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:24 executing program 0: r0 = socket(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)) 03:44:24 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000880), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000001ac0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000001b80)={&(0x7f0000001b00)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}}, 0x1c}}, 0x0) 03:44:24 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r0}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) [ 721.809171][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:44:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:44:24 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000040)) 03:44:24 executing program 1: r0 = socket(0x29, 0x2, 0x0) accept$phonet_pipe(r0, 0x0, 0x0) 03:44:24 executing program 5: syz_io_uring_setup(0x3bf5, &(0x7f0000000180)={0x0, 0x0, 0x20}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000240)) 03:44:24 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r0, 0x8008330e, 0x0) 03:44:24 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r0}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:24 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) ioctl$vim2m_VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000040)={0x1, @sliced={0x0, [0x2, 0x200]}}) 03:44:24 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r0}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:24 executing program 0: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000), 0x80c41, 0x0) 03:44:24 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) close(r0) 03:44:24 executing program 3: socket(0xa, 0x0, 0x8001) 03:44:25 executing program 5: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000dc0), 0x0, 0x0) ioctl$int_out(r0, 0x2, &(0x7f00000005c0)) [ 722.361223][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:44:25 executing program 5: timer_create(0x0, 0x0, &(0x7f0000000340)) timer_gettime(0x0, &(0x7f0000000400)) 03:44:25 executing program 0: socket(0x29, 0x2, 0x8) 03:44:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:25 executing program 1: syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x45a880) 03:44:25 executing program 3: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080), 0x4f0402, 0x0) 03:44:25 executing program 4: delete_module(&(0x7f0000000040)='\x00', 0x0) 03:44:25 executing program 5: mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x8171, 0xffffffffffffffff, 0x0) 03:44:25 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001a00), 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f00000000c0)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 03:44:25 executing program 0: add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f0000000340)={'fscrypt:', @desc1}, &(0x7f0000000380)={0x0, "5373d5fd2310e3daa24beb262f2c544c073d9508f93e440991737d7d717d4c4fd684929ce1054dc232f856c915a7d374becaaf63325ce95ddba3b56b9d71804d"}, 0x48, 0xffffffffffffffff) 03:44:25 executing program 3: openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) 03:44:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_JOIN_OCB(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000880)=ANY=[@ANYRES16], 0x2c}}, 0x0) 03:44:25 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) getpeername(r0, 0x0, &(0x7f00000005c0)) 03:44:25 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000140), 0x0, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x100010, r0, 0x0) 03:44:25 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000100)={"d221c98459772ab691d17c56a2fe0bef"}) 03:44:25 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001580)={&(0x7f00000000c0)={0x18, 0x0, 0x9, 0x101, 0x0, 0x0, {}, [@generic='m']}, 0x18}}, 0x0) 03:44:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:26 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x3, 0x1}, {}], 0x2, 0x0) 03:44:26 executing program 0: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000440)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000680)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$getsig(0x4202, 0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4001, 0x3, 0x288, 0x0, 0x0, 0x148, 0x0, 0x148, 0x1f0, 0x240, 0x240, 0x1f0, 0x240, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'xfrm0\x00', {0x28, 0x66010000, 0x0, 0x0, 0x4a02, 0xed, 0x7}}}, @common=@inet=@socket2={{0x28}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@ip={@empty, @private, 0x0, 0x0, 'veth0_to_bond\x00', 'bond_slave_0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2e8) socket$nl_xfrm(0x10, 0x3, 0x6) [ 723.527127][T16557] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 03:44:26 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000140), 0x0, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x100010, r0, 0x0) 03:44:26 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000100), &(0x7f0000000300)='./file0\x00', 0x0, 0x4, &(0x7f0000002940)=[{&(0x7f0000000340)="98", 0x1, 0xfffffffffffffff9}, {0x0}, {&(0x7f0000000940)="03", 0x1, 0xffffffff}, {&(0x7f0000000600)="a0", 0x1, 0x80000001}], 0x81, &(0x7f0000000840)={[{@barrier}, {@nodecompose}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 03:44:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x7, 0x1, 0x301}, 0x14}}, 0x0) 03:44:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x0, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000001900)={'batadv_slave_1\x00'}) [ 723.818954][T16569] loop3: detected capacity change from 0 to 264192 03:44:26 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000140), 0x0, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x100010, r0, 0x0) 03:44:26 executing program 5: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_JOIN_OCB(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000880)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01002dbd7000000000006c00000008000300", @ANYBLOB="0500180108"], 0x2c}}, 0x0) [ 723.908768][T16569] hfsplus: unable to parse mount options 03:44:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x0, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:26 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1100) [ 723.987890][T16569] loop3: detected capacity change from 0 to 264192 [ 724.036959][T16569] hfsplus: unable to parse mount options 03:44:26 executing program 4: socket$inet6(0xa, 0x0, 0xdbb) 03:44:26 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001a00), 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {}, [{0x2, 0x0, 0xee01}], {}, [{}]}, 0x34, 0x0) [ 724.197166][T16593] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 03:44:26 executing program 0: add_key$user(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000d00)='d', 0x1, 0xffffffffffffffff) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) 03:44:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x0, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:26 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000140), 0x0, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x100010, r0, 0x0) [ 724.290977][T16602] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 03:44:27 executing program 5: prlimit64(0x0, 0xe, &(0x7f00000001c0)={0x9, 0x400000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getrlimit(0x7, &(0x7f0000000500)) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000440)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000680)=0x36a) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$getsig(0x4202, 0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x4001, 0x3, 0x288, 0x0, 0x0, 0x148, 0x0, 0x148, 0x1f0, 0x240, 0x240, 0x1f0, 0x240, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'xfrm0\x00', {0x28, 0x66010000, 0x0, 0x0, 0x4a02, 0xed, 0x7}}}, @common=@inet=@socket2={{0x28}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}, {{@ip={@empty, @private, 0x0, 0x0, 'veth0_to_bond\x00', 'bond_slave_0\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@NFQUEUE1={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2e8) socket$nl_xfrm(0x10, 0x3, 0x6) 03:44:27 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x9) 03:44:27 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000040)=""/168) 03:44:27 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x1, 0x1, 0x5, 0x0, 0x0, {}, [@CTA_STATUS={0x8}]}, 0x1c}}, 0x0) 03:44:27 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[], 0x10c}}, 0x0) 03:44:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:27 executing program 3: capget(&(0x7f0000000080)={0x20071026}, &(0x7f0000000000)) 03:44:27 executing program 4: syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040), 0xffffffffffffffff) prctl$PR_GET_TSC(0x19, &(0x7f0000000440)) 03:44:27 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x02\x00\x00\x009\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\xfc\xeeG\xbeQ\xee\xf0\x99\x1e|C\xd8\x01\xd0\xf5\xbb}\xeb\x86P=\xe51\x9d,\xb7\xe6_M\xbe\x19\xea#\xff[\xd1\xc3\x9a\xa3\x1b\xf9\xe9\x1d \xce1\xc9\x9f\xb0\x14\xc2\xeb\xf9\xceE\xad\xa4\x92\f\xef\x87g\xb6\xabW\xac\rP\xf42\xb7\xc8\xaajnW\n\r\x802\xd7\x1b$\x95tO*\xf4\xae\xb8\xb8m\xbf\r\xd5\xbf*\xfd\xc7\x85\x1b\x8b\xe5\x97j`c\xe0\x88?\xda\x8a#t>r\xae\xe8\xc9)', 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1100) 03:44:27 executing program 5: semtimedop(0x0, &(0x7f00000000c0)=[{0x0, 0x7}], 0x1, 0x0) 03:44:27 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000001080)) 03:44:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:27 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000100), 0x0, 0x0, 0x3, &(0x7f0000002940)=[{&(0x7f0000000340)="98", 0x1, 0xfffffffffffffff9}, {&(0x7f0000000380)="89", 0x1}, {&(0x7f0000000940)="03", 0x1, 0xffffffff}], 0x0, &(0x7f0000000840)={[{@barrier}]}) [ 724.932461][T16643] capability: warning: `syz-executor.3' uses deprecated v2 capabilities in a way that may be insecure 03:44:27 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semtimedop(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x1000}, {0x0, 0x7}], 0x2, &(0x7f0000000100)={0x77359400}) 03:44:27 executing program 3: getpid() timer_create(0x0, 0x0, &(0x7f0000000280)) timer_getoverrun(0x0) 03:44:27 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/slabinfo\x00', 0x0, 0x0) read$usbmon(r0, 0x0, 0x0) 03:44:27 executing program 5: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_JOIN_OCB(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000880)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01002dbd7000000000006c00000008000300", @ANYRES32=0x0, @ANYBLOB="050018010800000008002659"], 0x2c}}, 0x0) [ 725.112502][T16651] loop0: detected capacity change from 0 to 264192 03:44:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) [ 725.183201][T16651] loop0: detected capacity change from 0 to 264192 03:44:27 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000001a00), 0x80142, 0x0) 03:44:27 executing program 3: semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000140)=""/211) 03:44:27 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) 03:44:27 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f00000034c0)=[{&(0x7f0000000200)="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", 0xffb, 0x5}], 0x0, 0x0) 03:44:28 executing program 5: semtimedop(0x0, &(0x7f0000000100), 0xec3ffd9437a1c124, 0x0) 03:44:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:28 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x101081, 0x0) 03:44:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000025c0)=[{{&(0x7f0000000180)={0xa, 0x4e20, 0x0, @dev}, 0x1c, &(0x7f00000013c0)=[{&(0x7f00000001c0)="85525f6b0196a105342ca2c910a031", 0xf}, {&(0x7f0000000240)="f1348694b932cfbbab283c8be2797df57e39d64989c3ed83d71c62f61bd032ff68bb18ff40a18a99d2ac03bb6cdc09e8ce6ad932837d6e0612e0b53cb78c0bd7d52a40d252ced3da01379a62632d2267e555bac364a3df956f9850e36c87cbba70bd66da0f2356d01d32985012495b59a7e4e4cdc7313cb7b12890e00365d574c6804c34f31598df58f49d03845ca84d40b0b46e77f7b64e908d25f5eee7e8235adcf69adf030b73ca8e9d1c959b3994383824978102647ef1d1b0f16b762f26be7cdeb4325f3a383ee43f7c363dc0da55241ec1d97b", 0xd6}, {&(0x7f0000000340)="77a841e4d9aa8a158e7785f3ddbbc2a8821606282b01260d16a74edb09dbe0d350cb95ed7bdc44c46fd75a40c9bd3a9672ac61e390de5b1158ed900f471501da829d0a9e7c89d6133fb8db", 0x4b}, {&(0x7f00000003c0)="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", 0x464}], 0x4, &(0x7f0000001440)=[@dstopts_2292={{0x30, 0x29, 0x3, {0x0, 0x2, '\x00', [@hao={0xc9, 0x10, @mcast2}]}}}], 0x30}}, {{0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f0000001500)="e6", 0x1}], 0x1}}], 0x4000393, 0x2004c840) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 725.529801][T16679] loop0: detected capacity change from 0 to 8 03:44:28 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/shm\x00', 0x4000, 0x0) 03:44:28 executing program 5: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4, 0x10, r0, 0x0) [ 725.649798][T16679] loop0: detected capacity change from 0 to 8 03:44:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:28 executing program 4: sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001a00), 0x0, 0x0) read$usbmon(r0, &(0x7f0000000000)=""/153, 0x99) 03:44:28 executing program 0: mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x9, 0x830, 0xffffffffffffffff, 0x0) 03:44:28 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) r1 = dup(r0) write$P9_RWRITE(r1, 0x0, 0x0) 03:44:28 executing program 3: open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) link(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000400)='./file0\x00') 03:44:28 executing program 5: timer_create(0x0, 0x0, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000140), 0x0) 03:44:28 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semtimedop(r0, &(0x7f0000000040)=[{0x0, 0x8}, {}], 0x2, &(0x7f0000000080)={0x0, 0x989680}) 03:44:28 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001a00), 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, 0x0) 03:44:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000034c0), 0x0, &(0x7f00000035c0)) 03:44:28 executing program 1: pipe2$9p(0x0, 0x86000) 03:44:28 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) accept4(r0, 0x0, 0x0, 0x0) 03:44:28 executing program 0: socket$inet6(0xa, 0x1, 0xbfffff02) 03:44:28 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x18, 0x4, 0x8, 0x3, 0x0, 0x0, {}, [@CTA_TIMEOUT_DATA={0x4}]}, 0x18}}, 0x0) 03:44:28 executing program 1: syz_open_dev$vcsn(&(0x7f0000000880), 0x0, 0x0) 03:44:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00'}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) 03:44:29 executing program 0: add_key$user(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) 03:44:29 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x183400, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0x5450, 0x0) [ 726.420640][T16731] FAT-fs (loop5): bogus number of reserved sectors [ 726.460572][T16731] FAT-fs (loop5): Can't find a valid FAT filesystem 03:44:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001280)={&(0x7f0000000280)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_CH_SWITCH_BLOCK_TX={0x4}, @NL80211_ATTR_CSA_IES={0xeac, 0xb9, 0x0, 0x1, [@NL80211_ATTR_CSA_C_OFF_PRESP={0x16, 0xbb, [0x85ff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_ATTR_CSA_C_OFF_PRESP={0x12, 0xbb, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @beacon_params=[@NL80211_ATTR_PROBE_RESP={0x3b1, 0x91, "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"}, @NL80211_ATTR_PROBE_RESP={0x58d, 0x91, "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"}, @NL80211_ATTR_BEACON_TAIL={0x3c, 0xf, [@preq={0x82, 0x36, @ext={{0x1, 0x0, 0x1}, 0x8, 0x2b, 0x2, @broadcast, 0x9, @device_a, 0xc3, 0x80, 0x2, [{{0x0, 0x0, 0x1}, @device_a, 0x89}, {{}, @broadcast, 0x3}]}}]}], @NL80211_ATTR_CSA_C_OFF_BEACON={0x8, 0xba, [0x9d6, 0x4]}, @beacon_params=[@NL80211_ATTR_IE={0x10, 0x2a, [@ibss={0x6, 0x2, 0x4955}, @gcr_ga={0xbd, 0x6}]}, @NL80211_ATTR_BEACON_HEAD={0x461, 0xe, {@with_ht={{{0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1}, {0x6}, @device_b, @broadcast, @initial, {0x5, 0x8}}, @ver_80211n={0x0, 0x1f, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1}}, 0x0, @random=0x8000, 0x400, @void, @void, @void, @val={0x4, 0x6, {0x1, 0x4, 0x20, 0x1}}, @void, @val={0x5, 0x8a, {0x71, 0xdd, 0x4, "244195e3e8b67e03bc4eb645852470fd528bf2a97e68656fae54cd7d2c7aa65e561a419a101b854392bff84ac44d76053b0b3db174669dbe78fce3b8109af7682fe440269d5af4e20e89dcd6f9ee3d2a9176f4195cded5d39ee8f4d102d4419829e1d5bea8ebd2cbc2c083aeca024cb09ff78cbf2239614e141cf18b03755e953c16e0a954ed4a"}}, @val={0x25, 0x3, {0x1, 0x64, 0x8}}, @void, @void, @void, @val={0x72, 0x6}, @void, @val={0x76, 0x6, {0x9, 0x1, 0x3f, 0x80}}, [{0xdd, 0x3b, "7b4e0a4f8ab0528a9a108be74cb081bd8183954b5c5d0657952471cd75293f6ba880732146b2a0cccf648cb7ec4fe8e6843705ccefbbab63dec2e7"}, {0xdd, 0xe3, "5161245c796600ec3448be0cf0146bf69ab9e859e1314cb23df9c29c563cc77f1d96a699d0f4ffd5a42740161c358c62ab39a028421ff0f3f31958fe14910eada04cfa6a8d21e7aabe3459d7f43744044c4d6ebd9b8fec673e9912663d8f9c7e602ca3ef5d938b1fea117ed217aa113370985798f81cc606a2f1caf0f57bb832a4c76e2fef3be4ae6bfe9a7b058a877635654b9b0ef39c4565a091407aa9ebc946f4b7b3705f858130c05ff64cc085fb9e5596fe658955b981fda544eb98a29b5783ae3d7595fbadecc61e255e9c3ec5d51f0cb7c1ac636f3460438a8fa11acf1e7e6f"}, {0xdd, 0x17, "782d261e7d2f1df54132ee4f65f0f3e504c6e08c13e59f"}, {0xdd, 0x36, "d44f500cbf3df082e75958f7191bfe144c2e7922f6bfb1de01dcc36d13b5438188d4ab5acdb96a54460e180ac0b9e9b5552be04855ab"}, {0xdd, 0x8c, "3329450239fcc0c549b42bf3434d66358deb5622ae8ce4539de68ed570452840a11d1056f8f392ba91d2932d99e27859e7177bcbac3ef14bdd591e96bbeaa66084219a575b3cd12cbb5ca40ffd57d2435466318db4f4b5155cd80826586ac8ef919bf46fe79810530c5e3ad8388513397efd6f154d48d4be18f78cf508896657ee684bc81782457e4d1f994b"}, {0xdd, 0x12, "454120dea63aadbf8ce386239c0ad2118d96"}, {0xdd, 0xc7, "131c523c51fe9a88b8d6a7b4e027b4053c513598e8be842fc291933fb4d51b4c7fce6e7f98447a0dad46800402eeb1783df2d39b9dca53480edb57e8be092a7baa019653c77c8471817003689ced4f555f66c53e0a5741a6291771acdc328ad835e32821feac546a9c5ed1b04a98b5fcee89e4a74980baf8e2fef8c91450d298de33de4678fa5ff5d55d7971feae0d24c1ee8d4ca2ebb3c57a4b20711c846db7932c5b88f277291295918ecda09a3dcfe3bde80bcce39fc4fff14aeb9c537ac39b6294010fc765"}, {0xdd, 0xac, "28fd4869902cb3ebe55ec1c9facac49fc3ac4ce43affb2cba8016208542080277378d5c080f5da4af2ded6e517b5111ccb3e1031155a5e6c5187fa13765e80b83d0f27112095f68952b888ec0c8e25fd3b484621a15ef005972a509c2ee3b444c2539faa21dbd17b6dc41697aa046266c77eaa47da491bd94a5649da3fe943bbc81d06e467c7ba6fd6b65f7f3e30d5f0a464ab267cf16f2f8543ae4ffa721e573e8f290b4f7f1968d27786ee"}]}}, @NL80211_ATTR_IE_ASSOC_RESP={0x4}, @NL80211_ATTR_IE_ASSOC_RESP={0x79, 0x80, [@supported_rates={0x1, 0x3, [{0x16}, {0x18, 0x1}, {0x30}]}, @rann={0x7e, 0x15, {{}, 0x0, 0x0, @device_b}}, @preq={0x82, 0x30, @not_ext={{}, 0x0, 0x0, 0x0, @device_b, 0x0, "", 0x0, 0x0, 0x2, [{{}, @device_b}, {{}, @broadcast}]}}, @random={0x0, 0x25, "17c2c445133837b945b637eea6c5c3b021dc91376c1b9cb0bceb73385d17fabae4afe2c02d"}]}]]}]}, 0xec4}, 0x1, 0x0, 0x0, 0x80}, 0x44000) 03:44:29 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_JOIN_OCB(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000880)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01002dbd7000000000006c000000080003", @ANYBLOB="05"], 0x2c}}, 0x0) [ 726.562137][T16731] FAT-fs (loop5): bogus number of reserved sectors [ 726.592836][T16731] FAT-fs (loop5): Can't find a valid FAT filesystem 03:44:29 executing program 0: capget(0x0, &(0x7f0000000000)) 03:44:29 executing program 5: semget$private(0x0, 0xa15e2df729d4aa22, 0x0) 03:44:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00'}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) 03:44:29 executing program 3: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RWALK(r0, &(0x7f0000000080)={0x9}, 0x9) [ 726.775541][T16754] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 03:44:29 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000280)={0x4c}, 0x4c}}, 0x0) [ 726.827381][T16757] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 03:44:29 executing program 4: r0 = syz_usbip_server_init(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000040)) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000440)) 03:44:29 executing program 0: socket$nl_sock_diag(0x10, 0x3, 0x4) add_key$user(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)="a7", 0x1, 0xfffffffffffffffb) 03:44:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00'}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) 03:44:29 executing program 5: r0 = syz_usbip_server_init(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000040)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000069680)={0x0, [], 0x0, "b84261e5b46341"}) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000440)) 03:44:29 executing program 3: add_key$user(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x3}, &(0x7f0000000d00)='d', 0x1, 0xffffffffffffffff) 03:44:29 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="0c01"], 0x10c}}, 0x0) [ 727.131881][T16772] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN 03:44:29 executing program 0: rt_sigtimedwait(&(0x7f0000001380), 0x0, &(0x7f00000013c0)={0x0, 0x3938700}, 0x8) 03:44:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00'}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 727.254493][T16780] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN 03:44:30 executing program 1: socket(0x38, 0x0, 0x0) 03:44:30 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0xb9c2c3c297f169, 0x0) 03:44:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00'}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 03:44:30 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x3f}]}) 03:44:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 03:44:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000340)={[{@utf8no}]}) 03:44:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00'}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 727.691555][T16772] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 727.784535][T16780] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 727.817959][T16800] FAT-fs (loop1): bogus number of reserved sectors 03:44:30 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001a00), 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0x5451, 0x0) 03:44:30 executing program 3: syz_80211_join_ibss(&(0x7f0000000000)='wlan1\x00', &(0x7f0000000040)=@default_ap_ssid, 0x6, 0x1) 03:44:30 executing program 0: syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x20000) 03:44:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00'}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) [ 727.838413][T16800] FAT-fs (loop1): Can't find a valid FAT filesystem [ 727.915794][T16800] FAT-fs (loop1): bogus number of reserved sectors [ 727.950383][T16800] FAT-fs (loop1): Can't find a valid FAT filesystem 03:44:30 executing program 0: socketpair(0x3d, 0x0, 0x0, &(0x7f0000000040)) 03:44:30 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) getsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, &(0x7f0000000080)) 03:44:30 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="a400000002010103000000000000000000000006040017000c000d8008000100ffffffff240001"], 0xa4}}, 0x0) 03:44:30 executing program 3: socketpair(0x10, 0x0, 0x0, &(0x7f0000000580)) 03:44:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00'}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 03:44:30 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x40) [ 728.208989][T16828] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.1'. 03:44:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x8008ae9d, 0x970000) [ 728.311476][T16828] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.1'. 03:44:31 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8916, 0x0) 03:44:31 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'gre0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='\v']}) 03:44:31 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000240)={0x0, 'veth0_macvtap\x00'}) 03:44:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x9f) 03:44:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00'}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 03:44:31 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x8f) 03:44:31 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) 03:44:31 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000500)=ANY=[@ANYBLOB="000000000400000024c6117b38e42a9d43"]) 03:44:31 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_ifreq(r0, 0x891b, &(0x7f0000000000)={'bond_slave_1\x00', @ifru_map}) 03:44:31 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$sock_buf(r0, 0x1, 0x30, 0x0, &(0x7f00000000c0)) 03:44:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0x0, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:31 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f00000001c0)={'gre0\x00', @ifru_names}) 03:44:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x23) 03:44:31 executing program 4: syz_mount_image$exfat(&(0x7f00000039c0), &(0x7f0000003a00)='./file1\x00', 0x0, 0x0, &(0x7f0000003e80), 0x0, &(0x7f0000004700)={[], [{@euid_eq}]}) 03:44:31 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000640)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}], 0x1c) 03:44:31 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_proto_private(r0, 0x8941, &(0x7f0000000000)='g') 03:44:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0x0, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:31 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f00000001c0)={'gre0\x00', @ifru_names}) 03:44:31 executing program 0: r0 = syz_open_dev$vim2m(&(0x7f00000002c0), 0x0, 0x2) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000300)={0x0, 0x6, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "58cbebe0"}}) [ 729.326722][T16873] exfat: Unknown parameter 'euid' [ 729.392503][T16873] exfat: Unknown parameter 'euid' 03:44:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0xbd) 03:44:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0x0, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x79) 03:44:32 executing program 3: syz_mount_image$iso9660(0x0, &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000001e00)='./file0\x00', &(0x7f0000001e40), 0x0, 0x0, 0x3) 03:44:32 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000080)={'macvtap0\x00', @ifru_names}) 03:44:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xc008ae05, 0x0) 03:44:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00'}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:32 executing program 5: syz_mount_image$ocfs2(&(0x7f0000001940), &(0x7f0000001980)='./file0\x00', 0x0, 0x0, &(0x7f0000002e80), 0x0, &(0x7f0000003040)={[{}]}) 03:44:32 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x1}, 0x14}}, 0x0) 03:44:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, 0x0) 03:44:32 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'tunl0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="1b00000006000000a700000096f76d57be67ddab1897931349659b39a650aca0e789ba44436ab9a1410b9df306c31a0118d8a14ddc96a51df8d4caf5a57dc6a480a675a1b37a37297caf9e7cf268f06aa70723da5f89a3ad2c570de4f2ef36002164fd9ee4a0ffdfcc5e3924806526de7a917a2cc3c24dfa124200080000230b8a1202f7c2b0fddcbb3305d2f4e82343176d2316671857a041e46fc46ef562306ee8e766e20bd1ce30411636a8a7e9ac3dca64a07b896a17ebbeab7aca3cdba8622c945487de7f6347190b7570ff946f5a96173e"]}) 03:44:32 executing program 1: syz_io_uring_setup(0x5a73, &(0x7f0000000400), &(0x7f0000fed000/0x11000)=nil, &(0x7f0000fed000/0x2000)=nil, 0x0, 0x0) syz_io_uring_setup(0x513a, &(0x7f00000000c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_setup(0x38d6, &(0x7f0000000180), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000200), &(0x7f0000000240)) 03:44:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00'}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:32 executing program 3: r0 = syz_io_uring_setup(0x38d6, &(0x7f0000000180), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000200), &(0x7f0000000240)) mmap$IORING_OFF_CQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x8000000) syz_io_uring_setup(0x5c04, &(0x7f0000000000), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) [ 730.313529][T16922] (syz-executor.5,16922,1):ocfs2_parse_options:1477 ERROR: Invalid heartbeat mount options 03:44:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00'}) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x2c, 0x13, 0xa29, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0xc, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x5, 0x0, 0x1, {0x4, 0x4}}]}]}, 0x2c}}, 0x0) 03:44:33 executing program 4: openat$sysfs(0xffffffffffffff9c, 0x0, 0x48a880, 0x0) [ 730.364031][T16922] (syz-executor.5,16922,1):ocfs2_fill_super:1186 ERROR: status = -22 03:44:33 executing program 0: mkdir(&(0x7f0000000f80)='./file1\x00', 0x0) syz_mount_image$v7(&(0x7f0000000fc0), &(0x7f0000001000)='./file1/../file0\x00', 0x6, 0x1, &(0x7f0000001300)=[{0x0, 0x0, 0xf4f3}], 0x0, &(0x7f0000001380)={[{'exfat\x00'}], [{@context={'context', 0x3d, 'unconfined_u'}}, {@audit}]}) 03:44:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x5421, 0xf04a00) 03:44:33 executing program 5: syz_mount_image$exfat(&(0x7f00000039c0), &(0x7f0000003a00)='./file1\x00', 0x0, 0x0, &(0x7f0000003e80), 0x0, &(0x7f0000004700)={[], [{@uid_eq}]}) 03:44:33 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x401c5820, 0x540000) 03:44:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x20, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}}, 0x20}}, 0x0) 03:44:33 executing program 3: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_ifreq(r0, 0x8916, &(0x7f0000000080)={'bond0\x00', @ifru_names}) [ 730.692514][T16942] loop0: detected capacity change from 0 to 244 03:44:33 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r1 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000000)={0x0, 'ip6tnl0\x00', {0x10}, 0x3f}) ioctl$sock_ifreq(r0, 0x5411, &(0x7f00000001c0)={'rose0\x00', @ifru_names}) [ 730.775123][T16946] exFAT-fs (loop5): invalid boot record signature [ 730.802265][T16946] exFAT-fs (loop5): failed to read boot sector [ 730.807465][T16942] VFS: could not find a valid V7 on loop0. [ 730.860624][T16946] exFAT-fs (loop5): failed to recognize exfat type 03:44:33 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8913, &(0x7f00000001c0)={'rose0\x00', @ifru_names}) 03:44:33 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x40086602, 0x400300) 03:44:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x20, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}}, 0x20}}, 0x0) 03:44:33 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x5452, &(0x7f00000001c0)={'rose0\x00', @ifru_names}) 03:44:33 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0xa2, 0x4, 0x1, 0x0, 0x1}, 0x40) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="b4050000000000006110600000000000c6000000010000009500000000000000639ea0aed15ae99e490cea1926c49582bad5c6f0dd433c8111ea67b54a7d217edea6ade3f0f53ab9e8e567"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r0, r1, 0x4}, 0x10) 03:44:33 executing program 1: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000), 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f00000000c0)={0x0, 0x3, [{}, {}, {}]}) 03:44:33 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x5411, &(0x7f00000001c0)={'rose0\x00', @ifru_names}) 03:44:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x20, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}}, 0x20}}, 0x0) 03:44:33 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x891f, &(0x7f00000001c0)={'rose0\x00', @ifru_names}) 03:44:33 executing program 0: mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000f80)='./file1\x00', 0x88) syz_mount_image$v7(0x0, &(0x7f0000001000)='./file1/../file0\x00', 0x6, 0x2, &(0x7f0000001300)=[{0x0}, {&(0x7f0000001180)}], 0x8800, &(0x7f0000001380)={[{'exfat\x00'}, {'-]5$-'}], [{@subj_user}, {@context={'context', 0x3d, 'unconfined_u'}}, {@audit}, {@obj_type={'obj_type', 0x3d, 'subj_role'}}]}) 03:44:34 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000f80)='./file1\x00', 0x0) syz_mount_image$v7(&(0x7f0000000fc0), &(0x7f0000001000)='./file1/../file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{0x0, 0x0, 0x9b2f}, {0x0}], 0x0, &(0x7f0000001380)={[], [{@context={'context', 0x3d, 'unconfined_u'}}]}) 03:44:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x4c) 03:44:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x24, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x4}]}, 0x24}}, 0x0) 03:44:34 executing program 4: syz_mount_image$iso9660(0x0, &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000003900)='./file0\x00', &(0x7f0000003940), &(0x7f0000003980), 0x1001, 0x0) 03:44:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) [ 731.532749][T16993] loop5: detected capacity change from 0 to 155 03:44:34 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000000)={0x8, 'ip6tnl0\x00'}) [ 731.597055][T16993] VFS: could not find a valid V7 on loop5. 03:44:34 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_proto_private(r0, 0x8941, &(0x7f0000000000)) 03:44:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x24, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x4}]}, 0x24}}, 0x0) [ 731.696910][T17009] loop5: detected capacity change from 0 to 155 03:44:34 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_GETPARAMS(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)={0x14, 0x0, 0x27b0bdb4edb92885}, 0x14}}, 0x0) [ 731.790133][T17009] VFS: could not find a valid V7 on loop5. 03:44:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0xa4) 03:44:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000e40)=@bridge_setlink={0x24, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x4}]}, 0x24}}, 0x0) 03:44:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x2, 0x540000) 03:44:34 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000f80)='./file1\x00', 0x0) syz_mount_image$v7(&(0x7f0000000fc0), &(0x7f0000001000)='./file1/../file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{0x0, 0x0, 0x9b2f}, {0x0}], 0x0, &(0x7f0000001380)={[], [{@context={'context', 0x3d, 'unconfined_u'}}]}) 03:44:34 executing program 3: keyctl$join(0x1, 0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz', 0x2}) 03:44:34 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)={0x40, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_SEC_KEY={0x18, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0x14, 0x4, "72da2d18a727b94199b3cf1fdf5b61f8"}]}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x40}}, 0x0) 03:44:34 executing program 1: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000240)={0x0, 0x3, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e4f0ffaf"}, 0x0, 0x0, @fd}) 03:44:34 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000180)={0x0, 0x5, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a6b0c438"}}) 03:44:34 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0xa1) [ 732.162164][T17036] loop5: detected capacity change from 0 to 155 03:44:34 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000062c0), 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_QUERY(r0, 0xc01864cb, &(0x7f0000006400)={0x0, 0x0}) [ 732.280335][T17036] VFS: could not find a valid V7 on loop5. 03:44:35 executing program 4: syz_mount_image$iso9660(&(0x7f0000002140), &(0x7f0000002180)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000036c0)) 03:44:35 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000f80)='./file1\x00', 0x0) syz_mount_image$v7(&(0x7f0000000fc0), &(0x7f0000001000)='./file1/../file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{0x0, 0x0, 0x9b2f}, {0x0}], 0x0, &(0x7f0000001380)={[], [{@context={'context', 0x3d, 'unconfined_u'}}]}) 03:44:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x9d) 03:44:35 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 03:44:35 executing program 2: mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x0) 03:44:35 executing program 3: mkdir(&(0x7f0000000f80)='./file1\x00', 0x0) syz_mount_image$v7(0x0, &(0x7f0000001000)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f0000002a40)='./file0\x00', 0x0, 0x0, 0x0) [ 732.594997][T17059] loop5: detected capacity change from 0 to 155 03:44:35 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$sock_int(r0, 0x1, 0x7, 0x0, &(0x7f0000000180)) 03:44:35 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8949, &(0x7f00000001c0)={'rose0\x00', @ifru_names}) [ 732.635569][T17059] VFS: could not find a valid V7 on loop5. 03:44:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0xb) 03:44:35 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x24) 03:44:35 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000f80)='./file1\x00', 0x0) syz_mount_image$v7(&(0x7f0000000fc0), &(0x7f0000001000)='./file1/../file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{0x0, 0x0, 0x9b2f}, {0x0}], 0x0, &(0x7f0000001380)={[], [{@context={'context', 0x3d, 'unconfined_u'}}]}) 03:44:35 executing program 3: syz_io_uring_setup(0x38d6, &(0x7f0000000180), &(0x7f0000936000/0x3000)=nil, &(0x7f0000a2a000/0x2000)=nil, &(0x7f0000000300), &(0x7f0000000240)) 03:44:35 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) 03:44:35 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000340), r1) sendmsg$IEEE802154_LLSEC_GETPARAMS(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="01"], 0x1c}}, 0x0) 03:44:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xc0189436, 0x400000) 03:44:35 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r1, 0x8250aea6, 0x0) [ 733.008468][T17085] loop5: detected capacity change from 0 to 155 [ 733.071330][T17085] VFS: could not find a valid V7 on loop5. 03:44:35 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000180), 0xfeed, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000006000)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000005c0)=""/234, 0xea}, {&(0x7f00000001c0)=""/138, 0x8a}], 0x2}}], 0x1, 0x0, 0x0) 03:44:35 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x15) 03:44:35 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x891b, 0x0) 03:44:35 executing program 1: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x6138, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:35 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$v7(&(0x7f0000000fc0), &(0x7f0000001000)='./file1/../file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{0x0, 0x0, 0x9b2f}, {0x0}], 0x0, &(0x7f0000001380)={[], [{@context={'context', 0x3d, 'unconfined_u'}}]}) 03:44:35 executing program 2: syz_mount_image$xfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) truncate(&(0x7f0000000c80)='./file0\x00', 0x0) 03:44:36 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_proto_private(r0, 0x89ea, &(0x7f0000000100)="e20a563d93bbb73a") 03:44:36 executing program 0: fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffff9c, 0x0) 03:44:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x401c5820, 0x400300) 03:44:36 executing program 1: move_mount(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x0) [ 733.447569][T17122] loop5: detected capacity change from 0 to 155 03:44:36 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_ifreq(r0, 0x8918, &(0x7f0000000000)={'rose0\x00', @ifru_names}) 03:44:36 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$v7(&(0x7f0000000fc0), &(0x7f0000001000)='./file1/../file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{0x0, 0x0, 0x9b2f}, {0x0}], 0x0, &(0x7f0000001380)={[], [{@context={'context', 0x3d, 'unconfined_u'}}]}) 03:44:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x9) 03:44:36 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54de4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3801}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:36 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0xbb) 03:44:36 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0xc) [ 733.736162][T17139] loop5: detected capacity change from 0 to 155 03:44:36 executing program 5: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$v7(&(0x7f0000000fc0), &(0x7f0000001000)='./file1/../file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{0x0, 0x0, 0x9b2f}, {0x0}], 0x0, &(0x7f0000001380)={[], [{@context={'context', 0x3d, 'unconfined_u'}}]}) 03:44:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) r1 = dup(r0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000002d000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) 03:44:36 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x0, @remote}], 0x10) 03:44:36 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000010c0)) 03:44:36 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x42) 03:44:36 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$sock_buf(r0, 0x1, 0x2e, 0x0, &(0x7f00000000c0)) [ 734.057551][T17160] loop5: detected capacity change from 0 to 155 03:44:36 executing program 5: mkdir(&(0x7f0000000f80)='./file1\x00', 0x0) syz_mount_image$v7(&(0x7f0000000fc0), &(0x7f0000001000)='./file1/../file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{0x0, 0x0, 0x9b2f}, {0x0}], 0x0, &(0x7f0000001380)={[], [{@context={'context', 0x3d, 'unconfined_u'}}]}) 03:44:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xc008ae09, 0x0) 03:44:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) r1 = dup(r0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000002d000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) 03:44:36 executing program 4: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000400)={'team_slave_1\x00', 0x0}) 03:44:37 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x6, 0x1, 0x9c}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 03:44:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000010c0)) [ 734.344190][T17177] loop5: detected capacity change from 0 to 155 [ 734.399983][T17177] VFS: could not find a valid V7 on loop5. 03:44:37 executing program 5: mkdir(&(0x7f0000000f80)='./file1\x00', 0x0) syz_mount_image$v7(&(0x7f0000000fc0), &(0x7f0000001000)='./file1/../file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{0x0, 0x0, 0x9b2f}, {0x0}], 0x0, &(0x7f0000001380)={[], [{@context={'context', 0x3d, 'unconfined_u'}}]}) 03:44:37 executing program 3: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x8094) mkdir(&(0x7f0000000f80)='./file1\x00', 0x0) syz_mount_image$v7(&(0x7f0000000fc0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000002ac0)='./file1\x00', &(0x7f0000002b00), 0x0) 03:44:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x17) 03:44:37 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8994, &(0x7f0000000000)={'macvlan0\x00', @ifru_flags}) 03:44:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) getsockopt$inet6_tcp_buf(r0, 0x6, 0x21, 0x0, &(0x7f00000010c0)) 03:44:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0xc5) [ 734.776451][T17199] loop5: detected capacity change from 0 to 155 03:44:37 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x890c, &(0x7f00000001c0)={'rose0\x00', @ifru_names}) [ 734.831306][T17199] VFS: could not find a valid V7 on loop5. 03:44:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x5452, 0x540000) 03:44:37 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$sock_buf(r0, 0x1, 0x28, 0x0, &(0x7f00000000c0)) 03:44:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x8000000) 03:44:37 executing program 5: mkdir(0x0, 0x0) syz_mount_image$v7(&(0x7f0000000fc0), &(0x7f0000001000)='./file1/../file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{0x0, 0x0, 0x9b2f}, {0x0}], 0x0, &(0x7f0000001380)={[], [{@context={'context', 0x3d, 'unconfined_u'}}]}) 03:44:37 executing program 4: r0 = syz_open_dev$hidraw(&(0x7f0000000080), 0x0, 0x0) read$hidraw(r0, 0x0, 0x0) 03:44:37 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x95) 03:44:37 executing program 1: syz_mount_image$bfs(&(0x7f0000001680), &(0x7f00000016c0)='./file1\x00', 0x0, 0x1, &(0x7f0000002840)=[{&(0x7f0000001700)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002980)={[], [{@smackfstransmute={'smackfstransmute', 0x3d, '\x00'}}]}) 03:44:37 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8921, &(0x7f00000001c0)={'rose0\x00', @ifru_names}) [ 735.152864][T17225] loop5: detected capacity change from 0 to 155 03:44:37 executing program 2: syz_open_dev$hidraw(&(0x7f0000000180), 0x0, 0x68842) 03:44:37 executing program 5: mkdir(0x0, 0x0) syz_mount_image$v7(&(0x7f0000000fc0), &(0x7f0000001000)='./file1/../file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{0x0, 0x0, 0x9b2f}, {0x0}], 0x0, &(0x7f0000001380)={[], [{@context={'context', 0x3d, 'unconfined_u'}}]}) 03:44:37 executing program 3: mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x2130, 0xffffffffffffffff, 0x10000000) [ 735.314189][T17236] loop1: detected capacity change from 0 to 1 03:44:38 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x88) [ 735.376388][T17236] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=085d8400) [ 735.434423][T17244] loop5: detected capacity change from 0 to 155 [ 735.462774][T17236] loop1: detected capacity change from 0 to 1 03:44:38 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) bind(r0, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xac141414}}, 0x80) 03:44:38 executing program 0: r0 = landlock_create_ruleset(&(0x7f0000000000)={0x808}, 0x8, 0x0) landlock_restrict_self(r0, 0x0) syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) [ 735.496708][T17236] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=085d8400) 03:44:38 executing program 5: mkdir(0x0, 0x0) syz_mount_image$v7(&(0x7f0000000fc0), &(0x7f0000001000)='./file1/../file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{0x0, 0x0, 0x9b2f}, {0x0}], 0x0, &(0x7f0000001380)={[], [{@context={'context', 0x3d, 'unconfined_u'}}]}) 03:44:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x5452, 0x400700) 03:44:38 executing program 4: removexattr(&(0x7f0000002f00)='./file0\x00', 0x0) 03:44:38 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'macsec0\x00', &(0x7f0000000100)=@ethtool_pauseparam={0x12}}) 03:44:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:44:38 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) bind(r0, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xac141414}}, 0x80) 03:44:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x4020940d, 0x400000) [ 735.852053][T17272] loop5: detected capacity change from 0 to 155 03:44:38 executing program 1: fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, 0x0, 0x0, 0xffffffffffffffff) 03:44:38 executing program 5: mkdir(&(0x7f0000000f80)='./file1\x00', 0x0) syz_mount_image$v7(0x0, &(0x7f0000001000)='./file1/../file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{0x0, 0x0, 0x9b2f}, {0x0}], 0x0, &(0x7f0000001380)={[], [{@context={'context', 0x3d, 'unconfined_u'}}]}) 03:44:38 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x41, 0x0) 03:44:38 executing program 0: syz_mount_image$iso9660(0x0, &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000003800)='./file0\x00', 0x0, 0x1020, 0x0) 03:44:38 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f00000001c0)={'rose0\x00', @ifru_names}) 03:44:38 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0) [ 736.112590][T17285] loop5: detected capacity change from 0 to 155 03:44:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40, 0x0) 03:44:38 executing program 4: syz_io_uring_setup(0x513a, &(0x7f00000000c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x0, 0x0) r0 = syz_io_uring_setup(0x38d6, &(0x7f0000000180), &(0x7f0000936000/0x3000)=nil, &(0x7f0000a2a000/0x2000)=nil, &(0x7f0000000300), &(0x7f0000000240)) syz_io_uring_setup(0x56da, &(0x7f0000000040)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000b0f000/0x3000)=nil, &(0x7f0000000140), &(0x7f0000000280)) 03:44:38 executing program 5: mkdir(&(0x7f0000000f80)='./file1\x00', 0x0) syz_mount_image$v7(0x0, &(0x7f0000001000)='./file1/../file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{0x0, 0x0, 0x9b2f}, {0x0}], 0x0, &(0x7f0000001380)={[], [{@context={'context', 0x3d, 'unconfined_u'}}]}) 03:44:38 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000080)) 03:44:39 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'gre0\x00', &(0x7f0000000000)=@ethtool_wolinfo={0x6, 0x0, 0x0, "e7d98824f5b7"}}) 03:44:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x40049409, 0x4) 03:44:39 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x1, @multicast, 'veth1_macvtap\x00'}}, 0x1e) 03:44:39 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000340), r1) sendmsg$IEEE802154_LLSEC_GETPARAMS(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000380)={0x14, r2, 0x1}, 0x14}}, 0x0) 03:44:39 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x3) [ 736.524236][T17308] loop5: detected capacity change from 0 to 155 03:44:39 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8915, 0x0) 03:44:39 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$sock_buf(r0, 0x1, 0x13, 0x0, &(0x7f00000000c0)) 03:44:39 executing program 5: mkdir(&(0x7f0000000f80)='./file1\x00', 0x0) syz_mount_image$v7(0x0, &(0x7f0000001000)='./file1/../file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{0x0, 0x0, 0x9b2f}, {0x0}], 0x0, &(0x7f0000001380)={[], [{@context={'context', 0x3d, 'unconfined_u'}}]}) 03:44:39 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000480)={0xe, 0x18, 0xfa00, @id_tos={0x0, r1}}, 0x20) 03:44:39 executing program 0: r0 = landlock_create_ruleset(&(0x7f0000000000)={0x4}, 0x8, 0x0) landlock_restrict_self(r0, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) 03:44:39 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8917, 0x0) 03:44:39 executing program 1: perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 03:44:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x40086602, 0x40000f) [ 736.969348][T17334] loop5: detected capacity change from 0 to 155 03:44:39 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8919, 0x0) 03:44:39 executing program 5: mkdir(&(0x7f0000000f80)='./file1\x00', 0x0) syz_mount_image$v7(&(0x7f0000000fc0), 0x0, 0x0, 0x2, &(0x7f0000001300)=[{0x0, 0x0, 0x9b2f}, {0x0}], 0x0, &(0x7f0000001380)={[], [{@context={'context', 0x3d, 'unconfined_u'}}]}) 03:44:39 executing program 0: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "8a70a225223b488f32f9136e13ba1370d1598ce030c3aef16a54c9cb96d2b0b1d556963d75f3f53b89bf87ceb27865590d1468a4df0e81cad55c98c0128e0a92"}, 0x48, 0xfffffffffffffffb) keyctl$update(0x2, r0, &(0x7f0000000240)="cf", 0x1) 03:44:39 executing program 4: syz_mount_image$iso9660(0x0, &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f00000037c0), &(0x7f0000003800)='./file0\x00', &(0x7f0000003840), 0x0, &(0x7f0000003880)) 03:44:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0xc3) 03:44:39 executing program 3: syz_mount_image$iso9660(0x0, &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f00000037c0), &(0x7f0000003800)='./file0\x00', 0x0, 0x1100, 0x0) 03:44:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0xaf) [ 737.322861][T17355] loop5: detected capacity change from 0 to 155 03:44:40 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={0x0, 0xffffff7f}}, 0x0) 03:44:40 executing program 5: mkdir(&(0x7f0000000f80)='./file1\x00', 0x0) syz_mount_image$v7(&(0x7f0000000fc0), 0x0, 0x0, 0x2, &(0x7f0000001300)=[{0x0, 0x0, 0x9b2f}, {0x0}], 0x0, &(0x7f0000001380)={[], [{@context={'context', 0x3d, 'unconfined_u'}}]}) 03:44:40 executing program 1: syz_mount_image$iso9660(&(0x7f0000002140), &(0x7f0000002180)='./file1\x00', 0x0, 0x0, &(0x7f0000003380), 0x0, &(0x7f00000036c0)={[], [{@smackfshat={'smackfshat', 0x3d, '],@,\\'}}]}) [ 737.444418][T17359] 9pnet: p9_fd_create_tcp (17359): problem connecting socket to 127.0.0.1 [ 737.507380][T17367] 9pnet: p9_fd_create_tcp (17367): problem connecting socket to 127.0.0.1 03:44:40 executing program 3: syz_mount_image$iso9660(0x0, &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000), 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000003900)='./file0\x00', &(0x7f0000003940), &(0x7f0000003980), 0x10, 0x0) 03:44:40 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_SEC_KEY={0x3f, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0x4}]}]}, 0x1c}}, 0x0) 03:44:40 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={0x0}, 0x1, 0x0, 0xffffff7f}, 0x0) [ 737.726293][T17376] loop5: detected capacity change from 0 to 155 03:44:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xc008ae88, 0x540000) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x0) 03:44:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xc008ae88, 0x400000) 03:44:40 executing program 5: mkdir(&(0x7f0000000f80)='./file1\x00', 0x0) syz_mount_image$v7(&(0x7f0000000fc0), 0x0, 0x0, 0x2, &(0x7f0000001300)=[{0x0, 0x0, 0x9b2f}, {0x0}], 0x0, &(0x7f0000001380)={[], [{@context={'context', 0x3d, 'unconfined_u'}}]}) [ 737.838072][T17392] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 737.869843][T17394] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 03:44:40 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x890b, 0x0) 03:44:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x5f) 03:44:40 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, 0x0, 0x0) 03:44:40 executing program 0: symlink(&(0x7f00000012c0)='\x00', &(0x7f0000001300)='./file0\x00') 03:44:40 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000040)={0x0, 'dummy0\x00'}) 03:44:40 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'macvlan1\x00'}) [ 738.115992][T17406] loop5: detected capacity change from 0 to 155 03:44:40 executing program 5: mkdir(&(0x7f0000000f80)='./file1\x00', 0x0) syz_mount_image$v7(&(0x7f0000000fc0), &(0x7f0000001000)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001380)={[], [{@context={'context', 0x3d, 'unconfined_u'}}]}) 03:44:40 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3, 0x0, &(0x7f00000000c0)) 03:44:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xc004ae0a, 0x0) 03:44:41 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8970, &(0x7f0000000100)={'veth0\x00', @ifru_flags}) 03:44:41 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = fsopen(&(0x7f0000000080)='cifs\x00', 0x0) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000000500)='\x00', 0x0, r0) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) 03:44:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xc008ae09, 0x400000) 03:44:41 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8927, &(0x7f0000000040)={'veth0_to_hsr\x00', @ifru_settings={0x0, 0x0, @raw_hdlc=0x0}}) 03:44:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xc008ae09, 0x401000) 03:44:41 executing program 5: mkdir(&(0x7f0000000f80)='./file1\x00', 0x0) syz_mount_image$v7(&(0x7f0000000fc0), &(0x7f0000001000)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001380)={[], [{@context={'context', 0x3d, 'unconfined_u'}}]}) 03:44:41 executing program 0: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x541b, &(0x7f00000001c0)={'rose0\x00', @ifru_names}) 03:44:41 executing program 1: socketpair(0x25, 0x1, 0xfffffff7, &(0x7f0000000040)) 03:44:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x4) 03:44:41 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000140)={'ip6gre0\x00', 0x0}) 03:44:41 executing program 5: mkdir(&(0x7f0000000f80)='./file1\x00', 0x0) syz_mount_image$v7(&(0x7f0000000fc0), &(0x7f0000001000)='./file1/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001380)={[], [{@context={'context', 0x3d, 'unconfined_u'}}]}) 03:44:41 executing program 4: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$sock_buf(r0, 0x1, 0x14, 0x0, &(0x7f00000000c0)) 03:44:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000002000)=[{r1, 0x2103, 0x64}], 0x1, &(0x7f0000000580)={0x0, r2+10000000}, 0x0, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) socket$pppl2tp(0x18, 0x1, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x0) 03:44:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x22) 03:44:41 executing program 3: syz_mount_image$iso9660(0x0, &(0x7f0000000880)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000003800)='./file0\x00', 0x0, 0x2010, 0x0) 03:44:41 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8992, &(0x7f00000001c0)={'rose0\x00', @ifru_names}) 03:44:41 executing program 4: syz_mount_image$ocfs2(0x0, &(0x7f0000001980)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr(&(0x7f0000007880)='./file0\x00', &(0x7f00000078c0)=@random={'os2.', '-'}, 0x0, 0x0, 0x0) 03:44:41 executing program 5: mkdir(&(0x7f0000000f80)='./file1\x00', 0x0) syz_mount_image$v7(&(0x7f0000000fc0), &(0x7f0000001000)='./file1/../file0\x00', 0x0, 0x1, &(0x7f0000001300)=[{0x0, 0x0, 0x9b2f}], 0x0, &(0x7f0000001380)={[], [{@context={'context', 0x3d, 'unconfined_u'}}]}) 03:44:41 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x8943, &(0x7f00000001c0)={'rose0\x00', @ifru_names}) 03:44:41 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000440), r0) sendmsg$NLBL_CALIPSO_C_ADD(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x24, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x24}}, 0x0) 03:44:42 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_ifreq(r0, 0x8915, &(0x7f00000001c0)={'rose0\x00', @ifru_names}) 03:44:42 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) [ 739.469713][T17478] loop5: detected capacity change from 0 to 155 [ 739.592615][T17478] VFS: could not find a valid V7 on loop5. 03:44:42 executing program 3: syz_mount_image$v7(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="0cf88e2e15f05b500b53453c822ed73b701160856d6c75712ad3153bb292937ba76c132f9a65cfb243bf4ed4e8aea02843822f30448481c65e7b7dc0deff0668b6a734c700546672cd62f0d37ff64b59b6c6594b86e443de90d837be1f0a2e62d38bd0d2a224754eaf787c1e70718dbdfc5961a0cc541259a39e0a3e2909b7a5681cc28e6379ae7845c7d4c701532d3b0e9f555474a49b6e89ab3672d3a0695b42c3339ceb03e120f5854d387692f0d8cc739a69b4da698e17fb4fff1a99c43ee76f69c32260f665d3a9b6a8a3b540d0964f33558983fa7d55e4f72ebd43b4b0f9aef0ecc16b32f292585ef5469bda67ae9738e5500c0304fbe591cb04757f7c7926e4c96b4d9ba5c894ac1960378090595659477cd526c0bbb76b8084bfa84a3b64a7be3b490f896a00c837bfc81fe1e804d190026647b8339acbe2099d642713271f5e97f2d84d4b3a79700fc1dd068ff423ac26ac3c886bbb540b11fb5642aeb3ea66f1e3aee00792a4bdec5e72ec0ba3b926d7816b72234ffc44e58ae1cb20dfcc21985883692e9c96e92b623bf430cefd8add09be0820ef84c38c9e1e3142d6ecc7530230db6213521d5339457c71ed4db45d5cf1f4325d7946af7999279ed44c8d49d43f5a92380b5d79ec86079cd6e5471243ecaadfe7c8dca39f8654ca14c9c8ec8b227ecc6cf8b732330fc57ed3d1d9bffd2b795a4f7d79b423b9c6fde710890932134cf2d5ca2e2134cbd5649b782e193ddcbdeadd520ca1fe657a27ee81d4a60e5d76523cbaf9b0c7e49abf431b4b5f5a11b6ea80578e79721c624cedc18e754645bc5b962e5efca0cd496842ec31ad1bf0599fd8c465908d88eafe1e22389d81fd48dcb1f7d739e936c7540f3858d36754d9b41cce574f80d919591ed3538ca734af327224e5f285b3244e500f10a61a1ee1e4ac5d75e832caf19b6596fede437b8c6a10c204bad8f8d4f89b2173ac97e1c1b39ad17227819b180742bff0d9d3aaa16cae7ce9b73c379681007418e25c2ee3f89c7635663192ef235e6548c0c1bc3272b3afca2fd0db94f420683e6c87faab2a03decc589c8e5188b270bddda11e20ffa887f40ba4fc863a9850c56372c02b4741d5e5c8e573b345ce5e9a8f0fa2b067a185f6c1e2cefcca5a440b57a18cb35b496b783d6577dd49af2fddb6914da30f49759d2a53dacafa84d3119a794a41a2ec6233d47c1c476f4d0b577e48c1b8ee4bf2259c101de24158659e0ec442b8ff47317c97e234712cfcce74a1e2f0bfda7d548d1f6e62c21e2baed6bad35f6749fd542d8257acc64b6daea7037e676a1c5e1d6c37c6395ae6bf12bdaa1bcce747be1cd4ff111ba688e30213565a78e8545857bed09a6ea6bcc16997714445cef169f26174980858754d210d7065c55d808f86a297a225c3be21e942517ec9dd21f6773c684e021d6be0e8bc409d625dbe7c2031059d18003ed667ce19ce95507d79ee376ea5cc9b5b86259a9aa3cd5264539f4fd24fed0f892a1571de7bba82982f7e28954736991093233096791f581f54019dab4c2af6b11a89eedae10ba7f28dc22ac1e41ad7b10b0edc43aec53d176d1b83689f5280e3e87c24945b05ac9541579323028b45d1c22c0cad6c3a95f5ba41e1437b7df3b448472dcfb399db3f310bcd003bd1aeafdfba241d0090bbfe785b51cd50a11509389f5cc2f3d80642e1c3adf9bfb0387809f8b03fa763a8983f9655bd35d970b6c03bd57aaa342c0422afa73eaab3c7c49014f53fa5f37841154ee5e727bd56a8855dc8278f47aa09dd046ed56194c129551fc786cd0a33eee4fa32146122fbb88c549453215f16f790ef48b3a0b62043fec640a1c46f01fffa62a674a53c4d9bd09f07f6c887c5efda880680653e116eee73d6329bae2c3647f9aef970dc2bba79d28fb89125495bfd20593a3a9eb3a822d7668ff8020a507a81cecfbe6a546f01d1714f04da0d7fec52e369db52974f41820b34370c6c4d1b381975f2fe559f15ce84ad391f95df60337e47ba59c6a2e425fdbe1c56a824b5cf3621da05cc3382f1559d674132a860ab30cde998106214901da484acc652340660be17a2f190dea80674815f62efcabb2d38f1a7066c8435ddb76b6a0ea959b0cf16a06cd1f27366cfc89f0d3d759543d13d93ed09c4572c61468efa6308274a3c350ebc7b803b12cae252b552f20ab9f9443007aadeba9faaefcb0ab36f4f4ebfe2214673e1ac963884e792606bf15cd63e7cfdb19bbddd106dbb250755757d1fa8a529fd335730c454fb78d023ae8362fcfc8d470ca236132d1beee4c67c2f25f7533adc890ff0f13425497f833fb1ef739b59c5db949b6b151c573e601e3b253256ebdcc165b36187eeb9a49ccc44cd60ac8c0fe9c34564fecd923ee9e0fedeca72b00be12bd200dfcac44935e7df901a3cb1b7d7415e350363a5589fc4e413cf1f6a7bf9de392479aa304108aac72a624a5c73b4bdea5573ae16551d30acffa9b5e55b4eb3b105905146a93fb527b00be84f1bb1ac9783cf595b0cb5d1e71122dea9f64163b3ef541e953c45ccd544fbe646348479eb517245fa4e918860772f1da0be6b1a8f195523f80ed61ff78d6996e80b03f6a2d6de785fd376b9d743fefbd3a636f885059fb5652fe45ae453813d675252531fb7925f2e66b51de098c31ff746d460368a358d32e575b6c4e2c6ae737edb505092b5a427487ae6e52595afe9f4957a9c91339ce24619e924bc8a71675aca353be5fc351bf0ec967b3e3e3dd74688bb53fdf62416ed3c093a38186825592db89262f9e1d515c4b6b5af4e859021b8a8b3ae39de702445f2a74dee22b6babd7cea6d5c85177e5d40c33d1d609ffc888241978f9243f5b550aff3ba027c873f74b17021e7f96b5f0eec498b11b4829ea20134eb108b046d6001b4fbbaef0c0bd181587300e5e8714b2c935b9dd7d7122c805fd3d2a8e9184db69869d6240c43a1f84784bf31a16886ef0e2ed568db7e6ac56b75ebb5d569b98a14d6eb0498fd635acc9499196e562f9619613db8e88d641d010947b221706e1725c8cbc9d600730a25563f40a135c375a7040c22552a7188d4794805923ad6bd23a2936184b2738a0a4d59a337bc9708cd61b36e9ab2fbf990e174063e9e70f8783acc84e3e9bece8018e409dd696b2f328b5345af691eaac7884361585476a6294aa74a6bb65413c8ca911cd1428117daa3dafe781f70dd715b162ab34ba20e24e9aa7089bfcde7406421d12dd6b32f79656b0d5db31275903be6312e533f9f06853dc98cc4fdd8059791692bc85174d1d46536e8eb44f6fa02a342ee9239768fdeb8108c94fc82f30ee927c61ac44d5f4e4e3273bff4a68898cb6971578f37fbf67df1198816ee94c4d1f86aa750cbadf380e245fbb152aeea29d65e3a2c7391ffa8713d6179b68f47039543a9d0e54643688a35f0908d5f484e4e16c12c50df3ded18254ccd48664dd91c7c4b1219bb1f7639987d387929c0b2898892a0ea8a0ac905c1eed1b28cf010dabb5b7f08bc97311258441f48040d4aca7e932e4ef5e0ffd221ffb9b0606baf8bdb3f399c3bd9349ce0e653e64764add735ba663da14c0b34c9ad5b55d9a776061649c6e04d61c1f0f84512cbde647b0f0d3710eb48e28bc43b1646756f7210fbf5e508eeee8b155e823478ab12e308b5af1d709e63f48b20f464d5b152801922a02e557694ef7eb5990fd694128551dfdc16c9b80761cad672e77165c7709136c98043d8c30cab0090bc894ad9a550d565cba805c668e28cee177d09c5afd01147aa67bfce2fd780846ae1d88961f0edae915f694e1d6775cdd6e8d7111f7af0b69db03a7fb4a6c897901138bd5202ae8636d627f0a7230e37fbd7040dc3da21dfb728ba4cc8c3b193260bd3bcd3a2314b2973a4d188610813cc4e459e434eecff4109d652020254fd92888e2aa87141c6b2fd5d3ece3bb84f54705d33a008e594ccc3339f55bba6e6c5a7eb374eadb4a486423e1b19e6a4dab71493e4c36d5979786643779b283b2d5ac00dfdb2d469506c8c323996d68115d6484076a3ffdaf830344a423df2033f6442460d68aacd6d423d7a603e5f077466f717f933567fb59046431e726f278a845d01a0aea1c089081f495d00d537c58d948ee26b0f7b9db6407ad92c9ecb77320d780c69f2bea48121f69d8740641581edd4e77388b70872debeb79c4fda35c27c716fdc89eb4745d4ab31fca6bf50ad7ea6fc8e4a6d55d701841a708a690ae94e86ee379a395b0c2ababaf53a01120cdc9b1bc069e6db1c0fbae8391296f8a359ae8eed9165ad2c92e8143f1a28a0cadbeedb03c4ed8dd8cbb87cb508d33587cd9a1ee629907734b74e3e685b7c94b77833db47296910238fffd54c2c3fe8f90018a12f8deceda7c75b24766e493be60a2078ac3db0a88908c70c6d33b76768bd90a5237b35955f6dd6974e72bcb19aba1bee846ec11733238adb212f584d8732d57b754364b6c67c8e26a936ab3ed0facc74b1a997a692f60ed5735f576c3d39a672eb20be990d55a36e644c92304ce460f8258b92ecfaf8b5e61b3cd974ec15ff5a385265ced12be5208273c1c2a62744e10113526c8a1e97b8dcfd367cdaf8584c4d64af39fedcc7ecfdfd788087f21335be49e2e3c3cbf9ea9175be6bf4e566fc0bad17773a855dd74fafdf6ce17a6bce09dd47025e66129dba08b2b8b2029840deb24b2464ffbb60a0c340cf0d8bdb5df80709489fee03170119efa2a08b34077e78749384c860873755400b373f9f5bef1b8d2ef67d195e27ca6bdcc37534c9eaee0462a5e747964725820cd8c6f031ae080f0259920c2c52f458825986f16a9b3913475a723ea4c2c60910611a1699e9cebcdd1c09f3294ee56405feddf77e481af90332c52fa4acf5742eb57eaf4a71c619eecd5898e161688bf77293f1c9a3f3f9d52a7458f44623b1406c030f33b0b808f51415495890a9fd461fa8c8f283c29d5a8cd47c988e14c2c41069dbc35bc801667978b6f38ac874ab8efffe7d287ced6305b969802af68b3f58c8ccd985c2b58a56f93cfa272ae4a1e953ea4757f4248dd709970e437a595f3658ff278b4b072225e81a2ceb09cd291d937912f8316315735aa9f951032cfc7f3ba6f470645390a23eb09a99cd4de365e6ce8cec54c9b9c0de9159794f6b35b7b150388ed87cdc2d5e63fc9f1b5b09d972e4d75a3e7f43b9a8d17487ce8810fa8d613893044937d759488bd101af03107abc4526d5bc64a4782d699897204b0f1f56a4bcf9c2830cfad19cd8635ddceb4524d2c5a65b785ba4efe6531d1a26b28e817538640b2cf8b4507a239e703872427f8476146ece72a23bf38f3be8cd40ec1c799c1b6830519aaaf0f8e68000fdb7dbc6e419610fbc1de61b3f1df9c18feff72409bb69e75bbba085bd046b77555822052ceb9187b53c1abe6ee8ec8ac92d34eb5ba961afab6fc2740c7af633588ea54c8c3b8506feedd51729638a541c31c9385bda1527e16c443b6f106e21e1e638b1a288dc8e1500160049793a2f5ed0b4d76934572720d27c4b612b081d3850f22eead9fce0dce9be03bfe0ea6994b4d0dcdf64871f32bdbfd38e7671299b2f94e0b10897ce0037e07fe0110de642afd5ab61b403b2e1bdd754340373e3c044e84093c05b686b539118c25a6f35a2dc76d2dad5a9b50a67d042daaca074ada3f81dae4bab659e375912402daed25389db685333f28bd765cc89d8f440e6aa386a6593961f9bf5803f56e56c1436", 0x1000}], 0x0, 0x0) 03:44:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x9b) [ 739.945299][T17500] loop3: detected capacity change from 0 to 8 03:44:44 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfe16, 0x200007fd, &(0x7f0000000200)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='hybla\x00', 0x6) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0x2bcf) 03:44:44 executing program 5: mkdir(&(0x7f0000000f80)='./file1\x00', 0x0) syz_mount_image$v7(&(0x7f0000000fc0), &(0x7f0000001000)='./file1/../file0\x00', 0x0, 0x0, &(0x7f0000001300), 0x0, &(0x7f0000001380)={[], [{@context={'context', 0x3d, 'unconfined_u'}}]}) 03:44:44 executing program 2: r0 = syz_io_uring_setup(0x38d6, &(0x7f0000000180), &(0x7f0000936000/0x3000)=nil, &(0x7f0000a2a000/0x2000)=nil, &(0x7f0000000300), &(0x7f0000000240)) syz_io_uring_setup(0x56da, &(0x7f0000000040)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000b0f000/0x3000)=nil, &(0x7f0000000140), &(0x7f0000000280)) 03:44:44 executing program 4: ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000540)=@v2={0x2, @aes256, 0x0, '\x00', @a}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa}, {0x3, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8}]}}]}, 0x3c}}, 0x0) 03:44:44 executing program 3: socket$inet6(0xa, 0x3, 0x3f) 03:44:44 executing program 1: r0 = syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) syz_usb_ep_read(r0, 0x2, 0x0, 0x0) 03:44:44 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3f) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vxcan0\x00'}) [ 742.248732][T17517] VFS: could not find a valid V7 on loop5. [ 742.276148][T17526] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 03:44:44 executing program 2: r0 = syz_open_dev$binderN(&(0x7f0000000000), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x401c5820, &(0x7f0000000180)={0x18, 0x0, &(0x7f0000000040)=[@increfs, @register_looper, @dead_binder_done], 0x0, 0x0, 0x0}) 03:44:45 executing program 5: mkdir(&(0x7f0000000f80)='./file1\x00', 0x0) syz_mount_image$v7(&(0x7f0000000fc0), &(0x7f0000001000)='./file1/../file0\x00', 0x0, 0x0, &(0x7f0000001300), 0x0, 0x0) 03:44:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000380), r0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000240), 0xffffffffffffffff) 03:44:45 executing program 3: keyctl$dh_compute(0x17, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={'hmac(rmd320-generic)\x00'}}) socketpair(0x0, 0x2, 0x0, 0x0) [ 742.519364][ T8398] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 742.523255][T17535] binder: 17533:17535 ioctl 401c5820 20000180 returned -22 03:44:45 executing program 0: syz_open_dev$vcsu(&(0x7f0000000040), 0xffffffffffffffff, 0x0) 03:44:45 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x5421, 0x0) 03:44:45 executing program 5: mkdir(&(0x7f0000000f80)='./file1\x00', 0x0) syz_mount_image$v7(&(0x7f0000000fc0), &(0x7f0000001000)='./file1/../file0\x00', 0x0, 0x0, &(0x7f0000001300), 0x0, 0x0) 03:44:45 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x4004556a, 0x3d) 03:44:45 executing program 0: ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 03:44:45 executing program 2: socketpair(0xa, 0x3, 0x3a, &(0x7f0000000080)) [ 743.104499][T17545] could not allocate digest TFM handle hmac(rmd320-generic) [ 743.120809][ T8398] usb 2-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 743.143968][ T8398] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 743.169488][T17545] could not allocate digest TFM handle hmac(rmd320-generic) [ 743.174723][ T8398] usb 2-1: Product: syz [ 743.200656][ T8398] usb 2-1: Manufacturer: syz [ 743.218781][ T8398] usb 2-1: SerialNumber: syz [ 743.281386][ T8398] usb 2-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 743.921840][ T8398] usb 2-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 744.152892][T13976] usb 2-1: USB disconnect, device number 2 [ 744.990368][ T8398] ath9k_htc 2-1:1.0: ath9k_htc: Target is unresponsive [ 744.998105][ T8398] ath9k_htc: Failed to initialize the device [ 745.007017][T13976] usb 2-1: ath9k_htc: USB layer deinitialized 03:44:47 executing program 1: syz_open_dev$vcsu(&(0x7f0000000000), 0x0, 0x101200) 03:44:47 executing program 4: socketpair(0x1e, 0x4, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 03:44:47 executing program 2: timer_create(0x2, 0x0, &(0x7f0000000240)) timer_gettime(0x0, &(0x7f0000000300)) 03:44:47 executing program 5: mkdir(&(0x7f0000000f80)='./file1\x00', 0x0) syz_mount_image$v7(&(0x7f0000000fc0), &(0x7f0000001000)='./file1/../file0\x00', 0x0, 0x0, &(0x7f0000001300), 0x0, 0x0) 03:44:47 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) getsockname(r0, &(0x7f0000000040)=@x25, &(0x7f0000000100)=0x80) 03:44:47 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000009c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000011c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000001240)={0x34, r2, 0xa19, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_STA_FLAGS2={0xc}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x34}}, 0x0) 03:44:47 executing program 2: clone3(&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f00000002c0)=""/137, 0x89, 0x0, &(0x7f0000000400)=[0x0], 0x1}, 0x58) syz_open_procfs$namespace(0x0, &(0x7f00000004c0)='ns/time_for_children\x00') 03:44:48 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 03:44:48 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x5421, 0x7fffffffefff) 03:44:48 executing program 1: socketpair(0x18, 0x0, 0xffff, &(0x7f0000000300)) 03:44:48 executing program 4: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_ROPEN(r0, 0x0, 0x0) 03:44:48 executing program 5: mkdir(&(0x7f0000000f80)='./file1\x00', 0x0) syz_mount_image$v7(&(0x7f0000000fc0), &(0x7f0000001000)='./file1/../file0\x00', 0x0, 0x0, &(0x7f0000001300), 0x0, &(0x7f0000001380)) 03:44:48 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000012c0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000001280)={0x0}}, 0x0) 03:44:48 executing program 1: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x8040, 0x0) 03:44:48 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000004240), 0x0, 0x0) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006100)) 03:44:48 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) fork() signalfd4(r0, &(0x7f0000000000)={[0x4]}, 0x8, 0x40000) readv(0xffffffffffffffff, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/consoles\x00', 0x0, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/consoles\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f0000000540)=""/133, 0x85}], 0x1) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:44:48 executing program 3: io_setup(0x800, &(0x7f0000000000)=0x0) io_cancel(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 745.804530][T17637] VFS: could not find a valid V7 on loop5. 03:44:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r0, 0x0, &(0x7f00000008c0)) 03:44:48 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000640), 0x22141, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000680)) 03:44:48 executing program 5: syz_emit_ethernet(0x42, &(0x7f0000000100)={@broadcast, @broadcast, @void, {@ipv4={0x800, @tipc={{0x5, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x6, 0x0, @local, @rand_addr=0x64010102}, @payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 03:44:48 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@broadcast, @broadcast, @void, {@arp={0x806, @generic={0x0, 0x0, 0x6, 0x7, 0x0, @dev, "ca4d310399b8a1", @local, "e3"}}}}, 0x0) 03:44:48 executing program 3: openat$nvram(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000000380), 0x0, 0x0) 03:44:48 executing program 4: syz_open_dev$vcsn(&(0x7f00000002c0), 0x0, 0x0) 03:44:48 executing program 2: openat$nvram(0xffffffffffffff9c, &(0x7f0000000640), 0x6c00, 0x0) 03:44:48 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000003f40)={0x0, 0x0, &(0x7f0000003f00)={0x0}, 0x1, 0x0, 0xf000}, 0x0) 03:44:48 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) connect$unix(r0, 0x0, 0x0) 03:44:49 executing program 3: syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x9, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) sendmsg$NL802154_CMD_SET_CHANNEL(0xffffffffffffffff, 0x0, 0x0) 03:44:49 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000080), 0xc, 0x0) read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) 03:44:49 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) fcntl$lock(r0, 0x11, &(0x7f0000000680)) 03:44:49 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000003f40)={0x0, 0x0, &(0x7f0000003f00)={&(0x7f00000040c0)={0x4c, 0x13, 0x1}, 0x4c}}, 0x0) recvmmsg(r0, &(0x7f0000004200)=[{{0x0, 0x0, &(0x7f00000015c0)=[{0x0}, {&(0x7f0000000340)=""/109, 0x6d}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40010042, &(0x7f0000004040)={0x0, 0x989680}) 03:44:49 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f0000000000)=@abs={0xed53b77ac7627865}, 0x6e) 03:44:49 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000940)='/proc/cgroups\x00', 0x0, 0x0) fstat(r0, &(0x7f00000009c0)) 03:44:49 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/block/loop0', 0x0, 0x0) 03:44:49 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/consoles\x00', 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/block/loop0', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) 03:44:49 executing program 4: ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000000, 0x40010, 0xffffffffffffffff, 0x3e205000) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$INCFS_IOC_PERMIT_FILL(0xffffffffffffffff, 0x40046721, 0x0) io_uring_setup(0xaa5, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x3}) 03:44:49 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000003f40)={0x0, 0x0, &(0x7f0000003f00)={&(0x7f00000040c0)={0x4c, 0x13, 0x1}, 0x4c}}, 0x0) recvmmsg(r0, &(0x7f0000004200)=[{{0x0, 0x0, &(0x7f00000015c0)=[{0x0}, {&(0x7f0000000340)=""/109, 0x6d}], 0x2}}, {{0x0, 0x0, &(0x7f0000004140)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x2, 0x40010042, &(0x7f0000004040)={0x0, 0x989680}) 03:44:49 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/tty/drivers\x00', 0x0, 0x0) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000540)=""/133, 0x85}], 0x1) 03:44:49 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000003f40)={0x0, 0x0, &(0x7f0000003f00)={&(0x7f0000001180)=ANY=[@ANYBLOB="48000000120001"], 0x4c}}, 0x0) [ 746.820560][ T1359] ieee802154 phy0 wpan0: encryption failed: -22 [ 746.826922][ T1359] ieee802154 phy1 wpan1: encryption failed: -22 03:44:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001980)={0x0, 0x0, 0x0}, 0x0) 03:44:49 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 03:44:49 executing program 4: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001b80)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x0}, 0x68) 03:44:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x7, &(0x7f0000000180)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0x1}, @map_val]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xa6, &(0x7f00000000c0)=""/166, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:44:49 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f000000d2c0)) 03:44:49 executing program 5: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000880), 0x200000, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 03:44:49 executing program 3: mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x4030, 0xffffffffffffffff, 0x0) 03:44:49 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f00000002c0), 0x8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000001c0), 0x4) 03:44:49 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_ext={0x1c, 0x0, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:44:49 executing program 1: bpf$LINK_GET_NEXT_ID(0x15, &(0x7f0000000040), 0x9e) 03:44:49 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x10}}], 0x10}, 0x0) 03:44:50 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x6, 0xffffffffffffffff}) 03:44:50 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:44:50 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000000900)=[{{0x0, 0x0, &(0x7f0000000340)=[{0x0}, {&(0x7f00000001c0)="e7", 0x1}], 0x2, &(0x7f00000003c0)=[@ip_tos_int={{0x14}}], 0x18}}], 0x1, 0x0) 03:44:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) open(&(0x7f00000001c0)='./bus\x00', 0x4e141, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0xfffffea3) socket$nl_audit(0x10, 0x3, 0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_audit(0x10, 0x3, 0x9) syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140), 0xffffffffffffffff) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010090c90000000000000500000008000300", @ANYRES32=r6], 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={&(0x7f0000000000)=ANY=[@ANYBLOB="46040000", @ANYRES16=r3, @ANYBLOB="ff830500000000000000", @ANYRES32=r4], 0x4}}, 0x0) sendfile(r2, r1, 0x0, 0x100000002) 03:44:50 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000003a80)={&(0x7f0000000340)='./file0/file0\x00'}, 0x10) 03:44:50 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x2, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:44:50 executing program 5: r0 = eventfd2(0x0, 0x80801) read$eventfd(r0, &(0x7f00000000c0), 0x8) 03:44:50 executing program 3: io_setup(0x5, &(0x7f0000000040)=0x0) io_submit(r0, 0x0, 0x0) io_pgetevents(r0, 0x9, 0x0, 0x0, &(0x7f00000006c0), &(0x7f0000000740)={&(0x7f0000000700)={[0x9]}, 0x8}) 03:44:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000001900)={0x14, 0x0, 0x5, 0x201}, 0x14}}, 0x0) 03:44:50 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/consoles\x00', 0x0, 0x0) poll(&(0x7f0000000040)=[{}, {r0}], 0x2, 0x800) 03:44:50 executing program 4: bpf$LINK_GET_NEXT_ID(0x15, &(0x7f0000000040)={0x86}, 0x8) [ 747.848499][ T26] audit: type=1804 audit(1630727090.455:24): pid=17747 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir023944215/syzkaller.jqYvkO/380/cgroup.controllers" dev="sda1" ino=15051 res=1 errno=0 03:44:50 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x5, &(0x7f0000000180)=@framed={{}, [@map_val]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xa6, &(0x7f00000000c0)=""/166, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:44:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:44:50 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/consoles\x00', 0x0, 0x0) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000540)=""/133, 0x85}], 0x1) read(r0, &(0x7f0000000080)=""/117, 0x75) 03:44:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000a40)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000a00)={&(0x7f0000000980)={0x14}, 0x14}}, 0x0) 03:44:50 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) fcntl$lock(r0, 0x3, 0x0) 03:44:50 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/consoles\x00', 0x0, 0x0) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000540)=""/133, 0x85}], 0x1) lseek(r0, 0x8, 0x1) [ 748.229533][T17764] loop3: detected capacity change from 0 to 1024 03:44:50 executing program 0: io_getevents(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)) [ 748.299627][T17764] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:44:51 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) fcntl$lock(r0, 0x4, 0x0) [ 748.373835][T17764] EXT4-fs (loop3): orphan cleanup on readonly fs [ 748.401389][T17764] EXT4-fs error (device loop3): ext4_free_inode:282: comm syz-executor.3: reserved or nonexistent inode 3 03:44:51 executing program 5: syz_emit_ethernet(0x42, &(0x7f0000000100)={@broadcast, @broadcast, @void, {@ipv4={0x800, @tipc={{0x5, 0x2, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x6, 0x0, @local, @loopback}, @payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 03:44:51 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/consoles\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) [ 748.516860][T17764] EXT4-fs warning (device loop3): ext4_enable_quotas:6343: Failed to enable quota tracking (type=0, err=-13). Please run e2fsck to fix. [ 748.572160][T17764] EXT4-fs (loop3): Cannot turn on quotas: error -13 [ 748.605261][T17764] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:44:51 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/consoles\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) poll(&(0x7f0000000440)=[{}, {r0, 0x8009}, {r1}], 0x3, 0x0) 03:44:51 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff}) flistxattr(r0, &(0x7f0000001300)=""/220, 0xdc) 03:44:51 executing program 5: openat$vsock(0xffffffffffffff9c, &(0x7f0000000980), 0x0, 0x0) 03:44:51 executing program 0: r0 = mq_open(&(0x7f0000000100)='+!]-[,}-]E+\'\\}\x00', 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) mq_timedreceive(r0, &(0x7f0000000180)=""/29, 0x1d, 0x0, &(0x7f0000000200)={r1, r2+60000000}) 03:44:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:44:51 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/consoles\x00', 0x0, 0x0) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000540)=""/133, 0x85}, {0x0}], 0x2) [ 748.968013][T17799] loop3: detected capacity change from 0 to 1024 03:44:51 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) syncfs(r0) 03:44:51 executing program 5: ppoll(0x0, 0x0, 0x0, &(0x7f0000000280), 0x8) [ 749.025579][T17799] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:44:51 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) fchmod(r0, 0x0) 03:44:51 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x729040, 0x0) fcntl$lock(r0, 0x25, 0x0) [ 749.099579][T17799] EXT4-fs (loop3): orphan cleanup on readonly fs 03:44:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$lock(r0, 0x5, &(0x7f0000000040)={0x0, 0x3}) [ 749.169707][T17799] EXT4-fs error (device loop3): ext4_free_inode:282: comm syz-executor.3: reserved or nonexistent inode 3 03:44:51 executing program 1: open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x0) socket(0x10, 0x803, 0x0) r0 = getpgid(0x0) r1 = fork() connect(0xffffffffffffffff, &(0x7f0000006e80)=@nfc={0x27, 0x0, 0x1, 0x5}, 0x80) kcmp(r0, r1, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={0x0, 0x2}, 0x2202, 0x81, 0x7, 0x4, 0x3, 0x7fff, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffe9f6}, r0, 0x3, 0xffffffffffffffff, 0xb) 03:44:51 executing program 2: io_setup(0x9, &(0x7f0000000000)=0x0) io_submit(r0, 0x1, &(0x7f0000000680)=[0x0]) 03:44:51 executing program 0: io_setup(0x80, &(0x7f0000000040)=0x0) io_destroy(r0) [ 749.264178][T17799] EXT4-fs warning (device loop3): ext4_enable_quotas:6343: Failed to enable quota tracking (type=0, err=-13). Please run e2fsck to fix. [ 749.308289][T17799] EXT4-fs (loop3): Cannot turn on quotas: error -13 [ 749.334432][T17799] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:44:52 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) dup(r0) 03:44:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:44:52 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000003f40)={0x0, 0x0, &(0x7f0000003f00)={&(0x7f00000040c0)={0x4c, 0x13, 0x1}, 0x4c}}, 0x0) 03:44:52 executing program 2: r0 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r0, &(0x7f0000000000)) 03:44:52 executing program 4: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000940), 0xffffffffffffffff) [ 749.926068][T17837] loop3: detected capacity change from 0 to 1024 [ 750.012683][T17837] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 750.106841][T17837] EXT4-fs (loop3): orphan cleanup on readonly fs [ 750.119008][T17837] EXT4-fs error (device loop3): ext4_free_inode:282: comm syz-executor.3: reserved or nonexistent inode 3 [ 750.130989][T17837] EXT4-fs warning (device loop3): ext4_enable_quotas:6343: Failed to enable quota tracking (type=0, err=-13). Please run e2fsck to fix. [ 750.145231][T17837] EXT4-fs (loop3): Cannot turn on quotas: error -13 [ 750.152329][T17837] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:44:52 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000006840), 0x0, 0x0) inotify_rm_watch(r0, 0x0) 03:44:52 executing program 1: open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x0) socket(0x10, 0x803, 0x0) r0 = getpgid(0x0) r1 = fork() connect(0xffffffffffffffff, &(0x7f0000006e80)=@nfc={0x27, 0x0, 0x1, 0x5}, 0x80) kcmp(r0, r1, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={0x0, 0x2}, 0x2202, 0x81, 0x7, 0x4, 0x3, 0x7fff, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffe9f6}, r0, 0x3, 0xffffffffffffffff, 0xb) 03:44:52 executing program 0: open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x4800003e, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000640)='./bus\x00', 0x0) socket(0x10, 0x803, 0x0) r0 = getpgid(0x0) r1 = fork() connect(0xffffffffffffffff, &(0x7f0000006e80)=@nfc={0x27, 0x0, 0x1, 0x5}, 0x80) kcmp(r0, r1, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={0x0, 0x2}, 0x2202, 0x81, 0x7, 0x4, 0x3, 0x7fff, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffe9f6}, r0, 0x3, 0xffffffffffffffff, 0xb) 03:44:52 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000640), 0x2, 0x0) 03:44:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x4040001) 03:44:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:44:53 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000780)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 03:44:53 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000003f40)={0x0, 0x0, &(0x7f0000003f00)={&(0x7f00000040c0)={0x4c, 0x13, 0x1}, 0x4c}}, 0x0) recvmmsg(r0, &(0x7f0000010980)=[{{0x0, 0x0, &(0x7f000000d600)=[{0x0}, {&(0x7f000000d540)=""/79, 0x4f}], 0x2}}], 0x1, 0x0, 0x0) 03:44:53 executing program 4: syz_io_uring_setup(0x4105, &(0x7f00000000c0)={0x0, 0x41d3, 0x0, 0x0, 0x1b4}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000000140), &(0x7f0000000180)) 03:44:53 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000003f40)={0x0, 0x0, &(0x7f0000003f00)={&(0x7f00000040c0)={0x4c}, 0x4c}, 0x7}, 0x0) [ 750.929053][T17869] loop3: detected capacity change from 0 to 1024 [ 751.052895][T17869] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:44:53 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) signalfd4(r0, &(0x7f0000000740), 0x8, 0x0) 03:44:53 executing program 2: syz_emit_ethernet(0x14, &(0x7f0000000000)={@link_local, @link_local, @val={@void, {0x8100, 0x0, 0x1}}, {@generic={0x86dd, '>\r'}}}, 0x0) 03:44:53 executing program 5: openat$nvram(0xffffffffffffff9c, &(0x7f0000000640), 0x80, 0x0) [ 751.126333][T17869] EXT4-fs (loop3): orphan cleanup on readonly fs [ 751.160542][T17869] EXT4-fs error (device loop3): ext4_free_inode:282: comm syz-executor.3: reserved or nonexistent inode 3 [ 751.210480][T17869] EXT4-fs warning (device loop3): ext4_enable_quotas:6343: Failed to enable quota tracking (type=0, err=-13). Please run e2fsck to fix. [ 751.228058][T17869] EXT4-fs (loop3): Cannot turn on quotas: error -13 [ 751.235563][T17869] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:44:53 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r0, 0x8010661b, 0x0) 03:44:54 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) lseek(r0, 0x0, 0x0) 03:44:54 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:44:54 executing program 5: openat$vcs(0xffffffffffffff9c, 0x0, 0x111000, 0x0) 03:44:54 executing program 1: syz_io_uring_setup(0x7be3, &(0x7f0000000080), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 03:44:54 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmmsg$inet(r0, &(0x7f0000000900)=[{{&(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10, 0x0}}], 0x1, 0x0) 03:44:54 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ppoll(&(0x7f0000000100)=[{r0, 0x101}], 0x1, &(0x7f0000000180), 0x0, 0x0) [ 751.590321][T17899] loop3: detected capacity change from 0 to 1024 03:44:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) fsetxattr$security_evm(r0, &(0x7f0000000000), &(0x7f0000000040)=@md5={0x1, "0000000000000000000000000000ac00"}, 0x11, 0x0) 03:44:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000022c0)) 03:44:54 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:44:54 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000980), 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) 03:44:54 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x88002) write$tun(r0, 0x0, 0x101e) 03:44:54 executing program 1: sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, 0x0, 0x0) 03:44:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={0x0}}, 0x0) 03:44:54 executing program 5: syz_io_uring_setup(0x0, &(0x7f00000000c0), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000000140), &(0x7f0000000180)) [ 751.951288][T17916] loop3: detected capacity change from 0 to 1024 03:44:54 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000100), 0x0, 0x0) fcntl$lock(r0, 0x24, &(0x7f0000001140)) 03:44:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000f40)={&(0x7f0000000b80)=@abs, 0x6e, &(0x7f0000000e80)=[{0x0}, {0x0}], 0x2}, 0x0) 03:44:54 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) 03:44:54 executing program 2: syz_emit_ethernet(0x82, &(0x7f0000000100)={@broadcast, @broadcast, @void, {@ipv4={0x800, @tipc={{0x5, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x3a, 0x0, @local, @loopback}, @payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 03:44:54 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:44:54 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000680)) 03:44:55 executing program 4: io_setup(0x5, &(0x7f0000000040)=0x0) io_submit(r0, 0x0, 0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, &(0x7f00000006c0), 0x0) 03:44:55 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/consoles\x00', 0x0, 0x0) readv(r0, 0x0, 0x0) 03:44:55 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$FUSE_ENTRY(r0, &(0x7f0000001540)={0x90}, 0x90) [ 752.446789][T17943] loop3: detected capacity change from 0 to 1024 03:44:55 executing program 5: mq_open(&(0x7f0000000100)='+!]-[,}-]E+\'\\}\x00', 0x0, 0x0, 0x0) 03:44:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:44:55 executing program 5: clock_gettime(0x2, &(0x7f0000000680)) 03:44:55 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/consoles\x00', 0x0, 0x0) dup3(r1, r0, 0x80000) [ 752.803875][T17960] loop3: detected capacity change from 0 to 1024 03:44:55 executing program 1: mq_open(&(0x7f0000000000)='\xff\xff\xff\xff\xff\xff', 0x0, 0x0, &(0x7f0000000040)) 03:44:55 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f000001acc0), 0x1, 0x0) write$FUSE_ATTR(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:44:55 executing program 2: r0 = eventfd2(0x3, 0x80801) read$eventfd(r0, &(0x7f00000000c0), 0x8) 03:44:55 executing program 5: io_cancel(0x0, &(0x7f0000001980)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_setup(0x40000000, &(0x7f0000000000)) 03:44:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:44:55 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000003f40)={0x0, 0x0, &(0x7f0000003f00)={0x0}, 0x300}, 0x0) 03:44:55 executing program 2: syz_emit_ethernet(0x42, &(0x7f0000000100)={@broadcast, @broadcast, @void, {@ipv4={0x8906, @tipc={{0x5, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x6, 0x0, @local, @loopback}, @payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) [ 753.311916][T17983] loop3: detected capacity change from 0 to 1024 03:44:56 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/consoles\x00', 0x0, 0x0) read(r0, 0x0, 0x0) 03:44:56 executing program 4: sendmsg$IEEE802154_LLSEC_DEL_DEV(0xffffffffffffffff, 0x0, 0x10) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cgroups\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000024c0)=[{{0x0, 0x0, &(0x7f0000001a80)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x286, 0x0, 0x0) 03:44:56 executing program 0: syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000014f00)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}}) 03:44:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:44:56 executing program 1: clone3(&(0x7f0000001300)={0x8000000, 0x0, 0x0, &(0x7f0000000180), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:44:56 executing program 2: io_uring_setup(0x90, &(0x7f0000003040)={0x0, 0x0, 0x2}) 03:44:56 executing program 5: io_uring_setup(0x5565, &(0x7f0000000000)={0x0, 0x0, 0x20}) 03:44:56 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/consoles\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, 0x0, 0x0) 03:44:56 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000b40)) [ 753.711467][T18003] loop3: detected capacity change from 0 to 1024 03:44:56 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x8, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:44:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:44:56 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/consoles\x00', 0x0, 0x0) r1 = fork() fcntl$lock(r0, 0x26, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, r1}) 03:44:56 executing program 5: clock_gettime(0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000000600)) clock_gettime(0x6, &(0x7f0000000640)) inotify_rm_watch(0xffffffffffffffff, 0x0) 03:44:56 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000003f40)={0x0, 0x0, &(0x7f0000003f00)={&(0x7f00000040c0)={0x4c, 0x14, 0x1, 0x0, 0x0, {0x2}}, 0x4c}}, 0x0) 03:44:56 executing program 4: io_uring_setup(0x7d3b, &(0x7f0000000140)) [ 754.054687][T18025] loop3: detected capacity change from 0 to 21 [ 754.122431][T18025] EXT4-fs (loop3): bad geometry: block count 54 exceeds size of device (10 blocks) 03:44:56 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/consoles\x00', 0x0, 0x0) ioctl(r0, 0x0, 0x0) 03:44:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:44:57 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000001e80)={0x0, 0x0, &(0x7f0000001e40)={&(0x7f0000001e00)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 03:44:57 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/bus/input/handlers\x00', 0x0, 0x0) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000540)=""/133, 0x85}], 0x1) 03:44:57 executing program 2: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) fcntl$lock(r0, 0x40b, &(0x7f0000000680)) 03:44:57 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmmsg$inet(r0, &(0x7f0000002d80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000040)="53f3047201a22f009470fc0c677c", 0xe}, {&(0x7f0000000140)="c1", 0x1}, {&(0x7f0000000200)="ba", 0x1}], 0x3}}], 0x1, 0x0) 03:44:57 executing program 1: fsopen(&(0x7f0000000040)='ubifs\x00', 0x0) [ 754.545693][T18052] loop3: detected capacity change from 0 to 21 03:44:57 executing program 4: syz_open_dev$sg(&(0x7f00000002c0), 0x0, 0x0) [ 754.619837][T18052] EXT4-fs (loop3): bad geometry: block count 54 exceeds size of device (10 blocks) 03:44:57 executing program 2: syz_open_procfs(0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) 03:44:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000780)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x10}}], 0x10}, 0x0) 03:44:57 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/consoles\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x40010, r0, 0x0) 03:44:57 executing program 1: openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x410101, 0x0) 03:44:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:44:57 executing program 4: fsopen(&(0x7f0000000000)='vfat\x00', 0x0) 03:44:57 executing program 2: syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x240441) 03:44:57 executing program 0: syz_open_dev$evdev(&(0x7f0000000140), 0x0, 0x4040) 03:44:57 executing program 5: syz_open_dev$evdev(&(0x7f00000001c0), 0x0, 0xe2f659f176473832) 03:44:57 executing program 1: syz_open_dev$evdev(&(0x7f0000000140), 0x101, 0x4040) [ 755.043298][T18074] loop3: detected capacity change from 0 to 21 [ 755.102566][T18074] EXT4-fs (loop3): bad geometry: block count 54 exceeds size of device (10 blocks) 03:44:57 executing program 2: syz_open_dev$evdev(&(0x7f00000014c0), 0x0, 0x100001) 03:44:57 executing program 4: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x227d, 0xa19, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) 03:44:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x0, 0x0, 0x81, &(0x7f00000000c0)) 03:44:57 executing program 1: syz_open_dev$evdev(&(0x7f0000000040), 0x82ed, 0x201) 03:44:58 executing program 5: syz_usb_connect$cdc_ncm(0x2, 0x95, &(0x7f0000000000)={{0x12, 0x1, 0x250, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x83, 0x2, 0x1, 0x7f, 0x40, 0x9, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0xb, 0x24, 0x6, 0x0, 0x1, "b74076f054fd"}, {0x5, 0x24, 0x0, 0x3}, {0xd, 0x24, 0xf, 0x1, 0xcb3, 0x1, 0x3, 0x1f}, {0x6}, [@mbim={0xc, 0x24, 0x1b, 0x1, 0x8, 0xe0, 0x9, 0xb5f, 0x6}, @mdlm={0x15}]}, {{0x9, 0x5, 0x81, 0x3, 0x3ff, 0xa1, 0xff, 0x7}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x6, 0xff, 0x1}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x7, 0x6, 0x2}}}}}}}]}}, &(0x7f0000000280)={0xa, &(0x7f0000000100)={0xa, 0x6, 0x310, 0x4, 0x0, 0x0, 0x10, 0x7f}, 0x21, &(0x7f0000000140)={0x5, 0xf, 0x21, 0x1, [@ssp_cap={0x1c, 0x10, 0xa, 0x9, 0x4, 0x6, 0xff0f, 0x7, [0x0, 0x3fff, 0xffff30, 0xff3ff0]}]}, 0x1, [{0x55, &(0x7f0000000180)=@string={0x55, 0x3, "23dc0cb64446d7e6599cdc14fc66d82755cfd11d4338c204c6b1dd1cb5ecc028291ad0793448d6567f8e67ff5407068318dd52d699f9c394ac4b487a8275dcb9e0b484b2b6e17d24e70b580fca136574bb169f"}}]}) 03:44:58 executing program 0: syz_open_dev$hiddev(&(0x7f0000000340), 0x0, 0x0) read$hiddev(0xffffffffffffffff, 0x0, 0x0) 03:44:58 executing program 2: syz_open_dev$evdev(&(0x7f0000000000), 0xfff, 0x4042) 03:44:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x0, 0x0, 0x81, &(0x7f00000000c0)) 03:44:58 executing program 1: syz_open_dev$evdev(&(0x7f0000000040), 0x82ed, 0x201) 03:44:58 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, 0x0) 03:44:58 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000001580), 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f00000015c0)=""/199) [ 755.710661][T13976] usb 5-1: new high-speed USB device number 2 using dummy_hcd 03:44:58 executing program 1: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x10, 0x227d, 0xa19, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, &(0x7f0000000340)={0x0, 0x0, 0x8, &(0x7f0000000080)={0x5, 0xf, 0x8, 0x1, [@generic={0x3}]}}) 03:44:58 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000001380), 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000001340)) [ 755.879616][T17598] usb 6-1: new full-speed USB device number 2 using dummy_hcd [ 755.998919][T13976] usb 5-1: Using ep0 maxpacket: 16 [ 756.140620][T13976] usb 5-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 756.218754][ T9147] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 756.338577][T17598] usb 6-1: not running at top speed; connect to a high speed hub [ 756.349262][T13976] usb 5-1: New USB device found, idVendor=227d, idProduct=0a19, bcdDevice= 0.40 [ 756.362879][T13976] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 756.381800][T13976] usb 5-1: Product: syz [ 756.392749][T13976] usb 5-1: Manufacturer: syz [ 756.403535][T13976] usb 5-1: SerialNumber: syz [ 756.432235][T17598] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1023, setting to 64 [ 756.458743][ T9147] usb 2-1: Using ep0 maxpacket: 16 [ 756.461759][T13976] usbhid 5-1:1.0: couldn't find an input interrupt endpoint [ 756.609539][T17598] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 756.623257][T17598] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 756.637115][T17598] usb 6-1: Product: syz [ 756.644385][T17598] usb 6-1: Manufacturer: syz [ 756.654698][T17598] usb 6-1: SerialNumber: syz [ 756.669535][ T9147] usb 2-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 756.678953][T13976] usb 5-1: USB disconnect, device number 2 [ 756.690684][T18104] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 756.858868][ T9147] usb 2-1: New USB device found, idVendor=227d, idProduct=0a19, bcdDevice= 0.40 [ 756.875021][ T9147] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 756.895937][ T9147] usb 2-1: Product: syz [ 756.903984][ T9147] usb 2-1: Manufacturer: syz [ 756.923469][ T9147] usb 2-1: SerialNumber: syz [ 756.981369][ T9147] usbhid 2-1:1.0: couldn't find an input interrupt endpoint [ 757.007153][T17598] cdc_ncm 6-1:1.0: bind() failure [ 757.017518][T17598] cdc_ncm 6-1:1.1: CDC Union missing and no IAD found [ 757.033771][T17598] cdc_ncm 6-1:1.1: bind() failure [ 757.063531][T17598] usb 6-1: USB disconnect, device number 2 [ 757.185669][T16969] usb 2-1: USB disconnect, device number 3 [ 757.459020][ T8398] usb 5-1: new high-speed USB device number 3 using dummy_hcd [ 757.698905][T17598] usb 6-1: new full-speed USB device number 3 using dummy_hcd [ 757.708783][ T8398] usb 5-1: Using ep0 maxpacket: 16 [ 757.853647][ T8398] usb 5-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 757.968667][T16969] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 758.084131][ T8398] usb 5-1: New USB device found, idVendor=227d, idProduct=0a19, bcdDevice= 0.40 [ 758.121367][ T8398] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 758.139527][T17598] usb 6-1: not running at top speed; connect to a high speed hub [ 758.148443][ T8398] usb 5-1: Product: syz [ 758.155986][ T8398] usb 5-1: Manufacturer: syz [ 758.166511][ T8398] usb 5-1: SerialNumber: syz [ 758.218734][T16969] usb 2-1: Using ep0 maxpacket: 16 [ 758.229711][T17598] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1023, setting to 64 [ 758.302052][ T8398] usbhid 5-1:1.0: couldn't find an input interrupt endpoint [ 758.419896][T16969] usb 2-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 03:45:01 executing program 4: syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x227d, 0xa19, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, {0x9}}}]}}]}}, 0x0) 03:45:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x0, 0x0, 0x81, &(0x7f00000000c0)) 03:45:01 executing program 0: syz_open_dev$evdev(&(0x7f00000014c0), 0x9, 0x100001) [ 758.475231][ T9147] usb 5-1: USB disconnect, device number 3 03:45:01 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000001380), 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000001440)=""/53) 03:45:01 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) ioctl$EVIOCSABS2F(r0, 0xc0189436, 0x0) [ 758.629988][T16969] usb 2-1: New USB device found, idVendor=227d, idProduct=0a19, bcdDevice= 0.40 [ 758.680770][T16969] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 758.698811][T17598] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 758.773149][T17598] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 758.775704][T16969] usb 2-1: Product: syz 03:45:01 executing program 0: syz_open_dev$hiddev(&(0x7f0000000080), 0x0, 0x0) syz_open_dev$hiddev(&(0x7f00000005c0), 0x0, 0x0) [ 758.831980][T16969] usb 2-1: Manufacturer: syz [ 758.848304][T17598] usb 6-1: Product: syz [ 758.886435][T16969] usb 2-1: SerialNumber: syz [ 758.889924][T17598] usb 6-1: Manufacturer: syz 03:45:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000000c0)) [ 758.939261][T17598] usb 6-1: can't set config #1, error -71 [ 758.976002][T17598] usb 6-1: USB disconnect, device number 3 03:45:01 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000000c0), r0) sendmsg$NLBL_MGMT_C_LISTDEF(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x25}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @loopback}]}, 0x24}}, 0x0) 03:45:01 executing program 2: r0 = socket(0x23, 0x5, 0x0) connect$nfc_raw(r0, 0x0, 0x0) [ 758.987287][T16969] usb 2-1: can't set config #1, error -71 [ 759.006167][T16969] usb 2-1: USB disconnect, device number 4 03:45:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x1}, 0x1c}}, 0x0) 03:45:01 executing program 0: r0 = socket(0x23, 0x5, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, 0x0, 0x0) [ 759.154740][T18219] loop3: detected capacity change from 0 to 1024 03:45:01 executing program 2: socket(0x1, 0x0, 0x540a) [ 759.264264][T18219] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 759.328567][ T8398] usb 5-1: new high-speed USB device number 4 using dummy_hcd [ 759.387150][T18219] EXT4-fs (loop3): orphan cleanup on readonly fs [ 759.426130][T18219] EXT4-fs error (device loop3): ext4_quota_enable:6306: comm syz-executor.3: Bad quota inode # 3 [ 759.449747][T18219] EXT4-fs warning (device loop3): ext4_enable_quotas:6343: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 759.467712][T18219] EXT4-fs (loop3): Cannot turn on quotas: error -116 [ 759.475454][T18219] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 759.588615][ T8398] usb 5-1: Using ep0 maxpacket: 16 [ 759.740243][ T8398] usb 5-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 759.974816][ T8398] usb 5-1: New USB device found, idVendor=227d, idProduct=0a19, bcdDevice= 0.40 [ 759.995777][ T8398] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 760.005685][ T8398] usb 5-1: Product: syz [ 760.058761][ T8398] usb 5-1: Manufacturer: syz [ 760.063399][ T8398] usb 5-1: SerialNumber: syz [ 760.151684][ T8398] usbhid 5-1:1.0: couldn't find an input interrupt endpoint [ 760.547349][ T8526] usb 5-1: USB disconnect, device number 4 03:45:03 executing program 4: r0 = socket(0x25, 0x5, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r0, 0x110, 0x4, 0x0, 0x0) 03:45:03 executing program 1: r0 = syz_genetlink_get_family_id$fou(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, r0, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @empty}}, @FOU_ATTR_AF={0x5}]}, 0x30}}, 0x0) 03:45:03 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000040)='+:{\\\x00', 0x5) 03:45:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x1}, 0x1c}}, 0x0) 03:45:03 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$SNDCTL_SEQ_SYNC(r0, 0x5101) 03:45:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000000c0)) [ 761.163023][T18251] loop3: detected capacity change from 0 to 1024 03:45:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x1}, 0x1c}}, 0x0) 03:45:03 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000040)='+:{\\\x00', 0x5) [ 761.255214][T18251] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:45:03 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000001740)={0x0, 0x1400}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000000b40)={&(0x7f0000000240)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000a40)=[@init={0x14}, @sndinfo={0x1c}, @prinfo={0x14}, @sndinfo={0x1c}, @dstaddrv4={0x10, 0x84, 0x9}, @sndrcv={0x2c}], 0x9c}, 0x0) 03:45:03 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_TX_POWER(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002600)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000c00000008"], 0x28}}, 0x0) [ 761.343103][T18251] EXT4-fs (loop3): orphan cleanup on readonly fs [ 761.359817][T18251] EXT4-fs error (device loop3): ext4_quota_enable:6306: comm syz-executor.3: Bad quota inode # 3 03:45:04 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000140), 0x3, 0x0) ioctl$DRM_IOCTL_MODE_GETPROPBLOB(r0, 0xc01064ac, 0x0) [ 761.373461][T18251] EXT4-fs warning (device loop3): ext4_enable_quotas:6343: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 761.402834][T18251] EXT4-fs (loop3): Cannot turn on quotas: error -116 [ 761.454811][T18251] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 761.482289][T18265] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 03:45:04 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000040)='+:{\\\x00', 0x5) 03:45:04 executing program 1: mmap$snddsp_status(&(0x7f0000ffd000/0x3000)=nil, 0x1000, 0x0, 0x6032, 0xffffffffffffffff, 0x82000000) 03:45:04 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r1, 0x1}, 0x1c}}, 0x0) [ 761.558951][T18273] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 03:45:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000000c0)) 03:45:04 executing program 0: socket(0x1e, 0x5, 0x0) 03:45:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x30, r1, 0x951963f7f5b4f853, 0x0, 0x0, {{}, {0x0, 0x400b}, {0x14, 0x13, @l2={'ib', 0x3a, 'syzkaller0\x00'}}}}, 0x30}}, 0x0) 03:45:04 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000040)='+:{\\\x00', 0x5) 03:45:04 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000002340)={&(0x7f0000000180)=@in={0x2, 0x0, @private=0xa010100}, 0x10, &(0x7f00000022c0)=[{&(0x7f00000001c0)="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", 0x4e5}], 0x1}, 0x0) 03:45:04 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x0, 0xa088828b5f057c6}, 0xc) [ 761.890118][T18289] loop3: detected capacity change from 0 to 1024 [ 761.920016][T18289] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:45:04 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) perf_event_open$cgroup(&(0x7f0000000200)={0x2, 0x80, 0x4, 0x9, 0x4, 0x4, 0x0, 0x4, 0x2340, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_config_ext={0x5}, 0x4, 0x1ff, 0x8001, 0x4, 0x26, 0x9, 0x20, 0x0, 0x3, 0x0, 0xa179}, r1, 0x0, 0xffffffffffffffff, 0xf) sigaltstack(&(0x7f0000455000/0x2000)=nil, 0x0) mremap(&(0x7f0000331000/0x3000)=nil, 0x4cb000, 0x600000, 0x3, &(0x7f00007fc000/0x600000)=nil) preadv(0xffffffffffffffff, &(0x7f0000001300)=[{0x0}], 0x1, 0x0, 0x0) r2 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf000000000000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000011100)="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", 0x1a0, 0xe000}], 0x0, &(0x7f00000001c0)={[{@check_relaxed}]}) faccessat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) r3 = openat(r1, &(0x7f0000000280)='./file0\x00', 0xa580, 0x151) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000180)=0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000002780)=[{{&(0x7f0000000340), 0x6e, &(0x7f00000005c0)=[{&(0x7f00000002c0)=""/49, 0x31}, {&(0x7f0000000500)=""/139, 0x8b}], 0x2, &(0x7f0000000600)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000000640), 0x6e, &(0x7f0000000840)=[{&(0x7f00000006c0)=""/244, 0xf4}, {&(0x7f00000007c0)=""/47, 0x2f}, {&(0x7f0000000800)=""/2, 0x2}], 0x3, &(0x7f0000000880)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f00000008c0), 0x6e, &(0x7f0000000b80)=[{&(0x7f0000000940)=""/99, 0x63}, {&(0x7f00000009c0)=""/178, 0xb2}, {&(0x7f0000000a80)=""/102, 0x66}, {&(0x7f0000000b00)=""/1, 0x1}, {&(0x7f0000000b40)=""/44, 0x2c}], 0x5, &(0x7f0000000c00)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}], 0x38}}, {{&(0x7f0000000c40)=@abs, 0x6e, &(0x7f0000000f80)=[{&(0x7f0000000cc0)=""/242, 0xf2}, {&(0x7f0000000dc0)=""/39, 0x27}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000000e00)=""/218, 0xda}, {&(0x7f0000000f00)=""/125, 0x7d}], 0x5, &(0x7f0000001000)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}}, {{&(0x7f0000001080)=@abs, 0x6e, &(0x7f0000001140)=[{&(0x7f0000001100)=""/7, 0x7}], 0x1, &(0x7f0000001180)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x130}}, {{0x0, 0x0, &(0x7f0000002680)=[{&(0x7f00000012c0)=""/58, 0x3a}, {&(0x7f0000001340)=""/182, 0xb6}, {&(0x7f0000001400)=""/126, 0x7e}, {&(0x7f0000001480)=""/3, 0x3}, {&(0x7f0000002580)=""/164, 0xa4}, {&(0x7f00000014c0)=""/38, 0x26}, {&(0x7f0000002640)=""/64, 0x40}], 0x7, &(0x7f0000002700)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x78}}], 0x6, 0x40, &(0x7f0000002900)={0x77359400}) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x20, 0x1, 0x8d, 0x1f, 0x0, 0x0, 0x1020, 0x4, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x7}, 0x8004, 0x8, 0x4, 0x4, 0x800, 0x8, 0x3, 0x0, 0x4}, r4, 0x10, r5, 0x2) socket$netlink(0x10, 0x3, 0x8000000004) openat(r2, &(0x7f0000000300)='./file0\x00', 0x100, 0x20) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {0x0, 0x0, 0x9}, {0x0, 0x0, 0xe, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {0x0, 0x0, 0x0, 0x10, 0x9, 0x1}, {0x10000, 0x0, 0x0, 0x0, 0x0, 0xc1, 0xff}, {0x0, 0x0, 0x0, 0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0xb3}, {}, {0xf000}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, [0x0, 0x0, 0x0, 0xfffffffffffffffc]}) 03:45:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)='m', 0x1}], 0x1, &(0x7f0000000180)=[@sndrcv={0xfffffffffffffd5a}], 0x30}, 0x0) [ 761.983467][T18289] EXT4-fs (loop3): orphan cleanup on readonly fs [ 762.041917][T18289] EXT4-fs error (device loop3): ext4_quota_enable:6306: comm syz-executor.3: Bad quota inode # 3 [ 762.125395][T18289] EXT4-fs warning (device loop3): ext4_enable_quotas:6343: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 03:45:04 executing program 2: r0 = socket(0x2, 0x5, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r0) 03:45:04 executing program 1: socket(0x15, 0x5, 0xffffff81) 03:45:04 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000e80)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8000}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x400086) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x401c5820, &(0x7f0000000040)) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) close(r2) [ 762.227425][T18289] EXT4-fs (loop3): Cannot turn on quotas: error -116 [ 762.242877][T18306] loop4: detected capacity change from 0 to 224 [ 762.261324][T18289] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:45:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:05 executing program 1: syz_open_dev$dri(&(0x7f00000000c0), 0x0, 0x1) 03:45:05 executing program 2: r0 = socket(0x2, 0x5, 0x0) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x44, 0x0, 0x0, 0x0, 0x0, {}, [{{@pci, {0x8}}, {0x8}}]}, 0xfffffdd2}}, 0x0) 03:45:05 executing program 4: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x6000) mincore(&(0x7f0000ffb000/0x4000)=nil, 0x4000, &(0x7f0000000000)=""/232) [ 762.606556][T18324] loop3: detected capacity change from 0 to 1024 [ 762.639288][T18324] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:45:05 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SNDCTL_TMR_TIMEBASE(r0, 0xc0045401, 0x0) [ 762.670777][T18324] EXT4-fs (loop3): orphan cleanup on readonly fs [ 762.708145][T18324] EXT4-fs error (device loop3): ext4_quota_enable:6306: comm syz-executor.3: Bad quota inode # 3 [ 762.721025][T18324] EXT4-fs warning (device loop3): ext4_enable_quotas:6343: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 762.736314][T18324] EXT4-fs (loop3): Cannot turn on quotas: error -116 [ 762.746464][T18324] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:45:05 executing program 5: bpf$OBJ_GET_PROG(0x1e, &(0x7f0000000280)={0x0, 0x0, 0x18}, 0x10) 03:45:05 executing program 1: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x24003, 0x0) 03:45:05 executing program 4: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x6000) mincore(&(0x7f0000ffb000/0x4000)=nil, 0x4000, &(0x7f0000000000)=""/232) 03:45:05 executing program 2: r0 = socket$inet(0x2, 0x6, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'erspan0\x00', 0x0}) 03:45:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:05 executing program 1: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x24003, 0x0) [ 763.275828][T18354] loop3: detected capacity change from 0 to 1024 [ 763.322597][T18354] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 763.385104][T18354] EXT4-fs (loop3): orphan cleanup on readonly fs [ 763.434812][T18354] EXT4-fs error (device loop3): ext4_quota_enable:6306: comm syz-executor.3: Bad quota inode # 3 03:45:06 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$fb(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, 0x0) 03:45:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x200000d7, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 03:45:06 executing program 4: pselect6(0x40, &(0x7f0000000080)={0x6}, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}, 0x0) 03:45:06 executing program 2: syz_io_uring_setup(0x7e00, &(0x7f0000000480)={0x0, 0x4da4, 0x1f}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000380), &(0x7f0000000500)) 03:45:06 executing program 1: bpf$OBJ_GET_PROG(0xe, 0x0, 0x0) [ 763.474393][T18354] EXT4-fs warning (device loop3): ext4_enable_quotas:6343: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 763.534003][T18354] EXT4-fs (loop3): Cannot turn on quotas: error -116 [ 763.575938][T18354] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:45:06 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000080), 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(r0, 0x5421, &(0x7f0000000000)={&(0x7f0000ffe000/0x2000)=nil}) 03:45:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:06 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, 0x5c) 03:45:06 executing program 5: syz_io_uring_setup(0x29cf, &(0x7f0000000280), &(0x7f000067d000/0x3000)=nil, &(0x7f00002dd000/0x1000)=nil, 0x0, 0x0) pkey_mprotect(&(0x7f0000004000/0x800000)=nil, 0x800000, 0x0, 0xffffffffffffffff) 03:45:06 executing program 2: bpf$PROG_LOAD(0x18, &(0x7f0000000300)={0x0, 0x200000d7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 03:45:06 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000280), 0x8) 03:45:06 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x4, 0x80502) write$RDMA_USER_CM_CMD_REJECT(r0, 0x0, 0x0) [ 763.918141][T18385] loop3: detected capacity change from 0 to 1024 03:45:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeca70e2c9031717d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 763.972542][T18385] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:45:06 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0x0) 03:45:06 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_SEQ_GETTIME(r0, 0x80045113, &(0x7f0000000080)) [ 764.033291][T18385] EXT4-fs (loop3): orphan cleanup on readonly fs [ 764.065303][T18385] EXT4-fs error (device loop3): ext4_quota_enable:6306: comm syz-executor.3: Bad quota inode # 3 03:45:06 executing program 0: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000080)={0x0, 0x3, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "9ba82851"}}) 03:45:06 executing program 4: mbind(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x99a4dc5c50e64c86, 0x0, 0x0, 0x0) [ 764.089555][T18385] EXT4-fs warning (device loop3): ext4_enable_quotas:6343: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 764.108109][T18385] EXT4-fs (loop3): Cannot turn on quotas: error -116 [ 764.119043][T18385] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:45:06 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x0, 0x101002) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000040)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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"}}}, 0x120) 03:45:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000), 0x0, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:06 executing program 5: perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x85, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x3b6af0}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x17, &(0x7f0000000400)=[{&(0x7f0000000340)="4f15a39a2df43b14ed5f2c578d4db055ee07f5a3d802cf8b50b4e7df21e18cb5fc59569f9e048c6343d4d93a8de61654aea60f37d00726bbbaf8413fa35f711e8ebd6b86b0d049ac43de63ad10d251b4fdb14d20706d042b10384fce5ec562f80eea2946c9cfc7f1078325732582af6da35442dfadaacf63643c41a7e5f882e09016d46b27739751f7cb3c9747d087919a9ce3b13b0c9a2774a54d8d5a2c5053ac2eebb14cad"}, {&(0x7f0000000240)="ae61a8d192171409dc2c19809ce70f90c61b402d89906f876fbb89196fa57c9dd7ed6fe73d4a9a050d32416a7e622c1c9943ab04d4e7db1546fab943d95d0a7057459e2d58c83e7f97ddda17b3aff67efc92f873b90a00b5d3c8226357fc7dce76f9ccb0c757e1f3f3d77ab2c382b1f474dbfc9f"}], 0x47, &(0x7f0000000000), 0x0, 0xb9efff7f}, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) 03:45:06 executing program 2: bpf$OBJ_GET_PROG(0x11, 0x0, 0x0) 03:45:07 executing program 0: prctl$PR_SET_MM(0x23, 0xa, &(0x7f0000ffd000/0x3000)=nil) 03:45:07 executing program 1: bpf$OBJ_GET_PROG(0x2, 0x0, 0x0) 03:45:07 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SNDCTL_SEQ_CTRLRATE(r0, 0xc0045103, 0x0) [ 764.389267][T18410] loop3: detected capacity change from 0 to 1024 [ 764.428579][T18410] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 764.505582][T18410] EXT4-fs (loop3): orphan cleanup on readonly fs [ 764.525123][T18410] EXT4-fs error (device loop3): ext4_quota_enable:6306: comm syz-executor.3: Bad quota inode # 3 03:45:07 executing program 2: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$fb(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) shmat(r0, &(0x7f0000fff000/0x1000)=nil, 0x0) [ 764.557368][T18410] EXT4-fs warning (device loop3): ext4_enable_quotas:6343: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 764.575299][T18410] EXT4-fs (loop3): Cannot turn on quotas: error -116 [ 764.582540][T18410] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:45:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000), 0x0, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:07 executing program 1: pselect6(0x5b, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x0, 0x28dd}, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140), 0x8}) 03:45:07 executing program 0: prctl$PR_SET_MM(0x23, 0xa, &(0x7f0000ffd000/0x3000)=nil) 03:45:07 executing program 2: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$fb(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) shmat(r0, &(0x7f0000fff000/0x1000)=nil, 0x0) 03:45:07 executing program 4: r0 = syz_io_uring_setup(0x6b43, &(0x7f0000000000), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000100)=""/7, 0x7}, {&(0x7f0000000140)=""/36, 0x24}], 0x2) [ 764.933214][T18438] loop3: detected capacity change from 0 to 1024 03:45:07 executing program 1: syz_io_uring_setup(0x1ba5, &(0x7f0000000000), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$fb(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) syz_io_uring_setup(0x5787, &(0x7f0000000140), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) [ 765.024992][T18438] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 765.104850][T18438] EXT4-fs (loop3): orphan cleanup on readonly fs [ 765.114892][T18438] EXT4-fs error (device loop3): ext4_quota_enable:6306: comm syz-executor.3: Bad quota inode # 3 [ 765.127536][T18438] EXT4-fs warning (device loop3): ext4_enable_quotas:6343: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 765.146888][T18438] EXT4-fs (loop3): Cannot turn on quotas: error -116 [ 765.154611][T18438] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:45:08 executing program 5: perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x85, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x3b6af0}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x17, &(0x7f0000000400)=[{&(0x7f0000000340)="4f15a39a2df43b14ed5f2c578d4db055ee07f5a3d802cf8b50b4e7df21e18cb5fc59569f9e048c6343d4d93a8de61654aea60f37d00726bbbaf8413fa35f711e8ebd6b86b0d049ac43de63ad10d251b4fdb14d20706d042b10384fce5ec562f80eea2946c9cfc7f1078325732582af6da35442dfadaacf63643c41a7e5f882e09016d46b27739751f7cb3c9747d087919a9ce3b13b0c9a2774a54d8d5a2c5053ac2eebb14cad"}, {&(0x7f0000000240)="ae61a8d192171409dc2c19809ce70f90c61b402d89906f876fbb89196fa57c9dd7ed6fe73d4a9a050d32416a7e622c1c9943ab04d4e7db1546fab943d95d0a7057459e2d58c83e7f97ddda17b3aff67efc92f873b90a00b5d3c8226357fc7dce76f9ccb0c757e1f3f3d77ab2c382b1f474dbfc9f"}], 0x47, &(0x7f0000000000), 0x0, 0xb9efff7f}, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) 03:45:08 executing program 0: prctl$PR_SET_MM(0x23, 0xa, &(0x7f0000ffd000/0x3000)=nil) 03:45:08 executing program 2: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$fb(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) shmat(r0, &(0x7f0000fff000/0x1000)=nil, 0x0) 03:45:08 executing program 4: r0 = syz_io_uring_setup(0x6b43, &(0x7f0000000000), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000100)=""/7, 0x7}, {&(0x7f0000000140)=""/36, 0x24}], 0x2) 03:45:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000), 0x0, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:08 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x25, &(0x7f0000000380)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f0000000440)=0x98) 03:45:08 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001840)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) [ 765.632753][T18463] loop3: detected capacity change from 0 to 1024 03:45:08 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000080)={0x0, 0x5, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "fe0e3683"}}) 03:45:08 executing program 4: syz_io_uring_setup(0x11bd, &(0x7f0000000100), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x3000)=nil], 0x0, &(0x7f0000000040), 0x0) 03:45:08 executing program 2: clock_gettime(0xb0caf3c3d24667e9, 0x0) [ 765.733748][T18463] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 765.820910][T18463] EXT4-fs (loop3): orphan cleanup on readonly fs [ 765.872189][T18463] EXT4-fs error (device loop3): ext4_quota_enable:6306: comm syz-executor.3: Bad quota inode # 3 [ 765.920080][T18463] EXT4-fs warning (device loop3): ext4_enable_quotas:6343: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 765.936790][T18463] EXT4-fs (loop3): Cannot turn on quotas: error -116 [ 765.945713][T18463] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:45:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100", 0x3, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:08 executing program 4: syz_io_uring_setup(0x11bd, &(0x7f0000000100), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x3000)=nil], 0x0, &(0x7f0000000040), 0x0) [ 766.302641][T18485] loop3: detected capacity change from 0 to 1024 [ 766.358920][T18485] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 766.379573][T18485] EXT4-fs (loop3): orphan cleanup on readonly fs [ 766.398050][T18485] EXT4-fs error (device loop3): ext4_quota_enable:6306: comm syz-executor.3: Bad quota inode # 3 [ 766.441626][T18485] EXT4-fs warning (device loop3): ext4_enable_quotas:6343: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 766.461944][T18485] EXT4-fs (loop3): Cannot turn on quotas: error -116 [ 766.469493][T18485] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:45:09 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xe, 0x0, 0x0, 0xfffffff7, 0xa}, 0x40) 03:45:09 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000001080)='/proc/tty/ldiscs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000020c0)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) 03:45:09 executing program 1: mbind(&(0x7f0000ff6000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x6) 03:45:09 executing program 2: madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1) 03:45:09 executing program 4: syz_io_uring_setup(0x11bd, &(0x7f0000000100), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, 0x0) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x3000)=nil], 0x0, &(0x7f0000000040), 0x0) 03:45:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100", 0x3, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:09 executing program 4: mlock2(&(0x7f0000ff6000/0x2000)=nil, 0x2000, 0x0) mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) 03:45:09 executing program 2: syz_io_uring_setup(0x2000545c, &(0x7f0000000040), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f00000000c0)) 03:45:09 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x0, 0x0) mmap$xdp(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) 03:45:09 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xe, 0x0, 0x0, 0x0, 0xa}, 0x40) 03:45:09 executing program 0: r0 = openat$procfs(0xffffff9c, &(0x7f0000001080)='/proc/tty/ldiscs\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000020c0)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) [ 766.773738][T18507] loop3: detected capacity change from 0 to 1024 [ 766.831487][T18507] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:45:09 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000004c0)={&(0x7f00000003c0)=@in6={0xa, 0x0, 0x0, @private1}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000008400000000000000ff0f3800090040001800000000000000840000000500000059"], 0x48}, 0x0) [ 766.872997][T18507] EXT4-fs (loop3): orphan cleanup on readonly fs [ 766.907901][T18507] EXT4-fs error (device loop3): ext4_quota_enable:6306: comm syz-executor.3: Bad quota inode # 3 03:45:09 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x4, 0x0, 0x0) [ 767.022431][T18507] EXT4-fs warning (device loop3): ext4_enable_quotas:6343: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 03:45:09 executing program 2: madvise(&(0x7f0000fef000/0x3000)=nil, 0x3000, 0x3) 03:45:09 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000)={0xffffffff}, 0x8) 03:45:09 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000080), 0x200000000000, 0x29502) ioctl$DRM_IOCTL_GET_MAP(r0, 0x40086602, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil}) 03:45:09 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000040)={0x0, @in6={{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}, &(0x7f0000000100)=0x98) [ 767.149631][T18507] EXT4-fs (loop3): Cannot turn on quotas: error -116 [ 767.188049][T18507] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:45:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100", 0x3, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000100)={0x5, 0x10, 0xfa00, {&(0x7f0000000380), r1}}, 0x18) 03:45:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)) 03:45:09 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x9, 0x0, 0x0, 0x0, 0xc00}, 0x40) 03:45:10 executing program 5: ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) mmap$fb(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) clock_gettime(0x1, &(0x7f00000002c0)) 03:45:10 executing program 4: syz_io_uring_setup(0x11bd, &(0x7f0000000100), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, 0x0) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x12) 03:45:10 executing program 1: socket(0x28, 0x0, 0x793) 03:45:10 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x85, &(0x7f0000000380)={0x0, @in={{0x2, 0x0, @multicast2}}}, &(0x7f0000000440)=0x98) 03:45:10 executing program 2: syz_io_uring_setup(0x1825, &(0x7f0000000380)={0x0, 0x0, 0x5}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000400), &(0x7f0000000440)) [ 767.656279][T18552] loop3: detected capacity change from 0 to 1024 [ 767.700144][T18552] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:45:10 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080), 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0045878, 0x0) [ 767.761967][T18552] EXT4-fs (loop3): orphan cleanup on readonly fs [ 767.802710][T18552] EXT4-fs error (device loop3): ext4_quota_enable:6306: comm syz-executor.3: Bad quota inode # 3 [ 767.814486][T18552] EXT4-fs warning (device loop3): ext4_enable_quotas:6343: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 767.837790][T18552] EXT4-fs (loop3): Cannot turn on quotas: error -116 03:45:10 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x100, 0x0, 0x0, 0x0, 0x5}, 0x14) [ 767.845209][T18552] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:45:10 executing program 4: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x6000) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 03:45:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000", 0x5, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:10 executing program 5: mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4002, &(0x7f0000000100)=0xe96, 0x4, 0x0) 03:45:10 executing program 0: syz_io_uring_setup(0xdfb, &(0x7f0000000280), &(0x7f0000003000/0x2000)=nil, &(0x7f0000001000/0x4000)=nil, &(0x7f0000000380), &(0x7f0000000640)) 03:45:10 executing program 2: mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8000, 0x0, 0x0, 0x0) 03:45:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict]}}, &(0x7f0000000100)=""/177, 0x26, 0xb1, 0x1}, 0x20) 03:45:10 executing program 4: r0 = socket$inet(0x2, 0x6, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000002440)=[{&(0x7f00000001c0)="23bc5f12f1fa27fc35d0dc258521b7c61ceb646cee675db03d46a73653b6294cc18679d3791c3ef2b6d6a7259435af5a22cb022ff33c15f8832d879b760c2ab0cef7d158", 0x44}, {&(0x7f0000000380)="310e73fb595092b52f42bb6bf762385503536db441334a74500d0bcddcb84994b092c6c87d787beaabf8e8b76b12ee7e1ebe678a442e270a42558e2fff797852be9c7264d8c63239831d47878692d1d6c0c54c39ff9898d1e3e5851790822650221d0ea4ba40a01bd59826b0e52f5d9faaa89ca373a376382955685cdb3939a117a88366406becb82db73883a7d9ebd546db311f48c9be4fe64e1b63eb15", 0x9e}, {&(0x7f0000000440)="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", 0x137}], 0x3}, 0x0) 03:45:10 executing program 5: get_mempolicy(0x0, &(0x7f0000000040), 0xfffffffffffffff9, &(0x7f0000000000/0x4000)=nil, 0x2) [ 768.208534][T18583] loop3: detected capacity change from 0 to 1024 03:45:10 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x0, 0x101002) write$RDMA_USER_CM_CMD_CONNECT(r0, 0x0, 0x0) 03:45:10 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x1, 0x800, 0x7fffffff) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f00000000c0)={{0x1, 0x8ed2}, 0x50}, 0x10) mmap$fb(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$fb(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x50, r2, 0x85000) io_uring_register$IORING_UNREGISTER_FILES(0xffffffffffffffff, 0x3, 0x0, 0x0) shmget$private(0x0, 0x3000, 0xc00, &(0x7f0000ffd000/0x3000)=nil) [ 768.276672][T18583] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:45:11 executing program 1: syz_open_dev$dri(&(0x7f0000000080), 0x1, 0x0) [ 768.354744][T18583] EXT4-fs (loop3): orphan cleanup on readonly fs [ 768.385554][T18583] EXT4-fs error (device loop3): ext4_quota_enable:6306: comm syz-executor.3: Bad quota inode # 3 [ 768.400783][T18583] EXT4-fs warning (device loop3): ext4_enable_quotas:6343: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 03:45:11 executing program 4: syz_io_uring_setup(0x11bd, &(0x7f0000000100), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, 0x0) mlock(&(0x7f0000ff6000/0xa000)=nil, 0xa000) 03:45:11 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080), 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(r0, 0x40086602, 0x0) [ 768.592808][T18583] EXT4-fs (loop3): Cannot turn on quotas: error -116 [ 768.664022][T18583] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:45:11 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000", 0x5, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:11 executing program 1: syz_io_uring_setup(0x7fbf, &(0x7f0000000100), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff4000/0xa000)=nil, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$fb(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) syz_io_uring_setup(0x7273, &(0x7f0000000200), &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ff5000/0x1000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) 03:45:11 executing program 2: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x6000) mlock2(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0) shmat(r0, &(0x7f0000ffe000/0x1000)=nil, 0x4000) 03:45:11 executing program 0: syz_io_uring_setup(0x11bd, &(0x7f0000000100), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, 0x0) r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmat(r0, &(0x7f0000ffd000/0x3000)=nil, 0x6000) shmat(r0, &(0x7f0000ffe000/0x1000)=nil, 0x4000) mlock(&(0x7f0000ff6000/0xa000)=nil, 0xa000) 03:45:11 executing program 4: mlock2(&(0x7f0000ff6000/0x2000)=nil, 0x2000, 0x1) mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) 03:45:11 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080), 0x0, 0x0) ioctl$DRM_IOCTL_GET_MAP(r0, 0x5452, &(0x7f0000000000)={&(0x7f0000ffe000/0x2000)=nil}) 03:45:11 executing program 2: perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x85, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0xc00a3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x3b6af0}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x17, &(0x7f0000000400)=[{&(0x7f0000000340)="4f15a39a2df43b14ed5f2c578d4db055ee07f5a3d802cf8b50b4e7df21e18cb5fc59569f9e048c6343d4d93a8de61654aea60f37d00726bbbaf8413fa35f711e8ebd6b86b0d049ac43de63ad10d251b4fdb14d20706d042b10384fce5ec562f80eea2946c9cfc7f1078325732582af6da35442dfadaacf63643c41a7e5f882e09016d46b27739751f7cb3c9747d087919a9ce3b13b0c9a2774a54d8d5a2c5053ac2eebb14cad"}, {&(0x7f0000000240)="ae61a8d192171409dc2c19809ce70f90c61b402d89906f876fbb89196fa57c9dd7ed6fe73d4a9a050d32416a7e622c1c9943ab04d4e7db1546fab943d95d0a7057459e2d58c83e7f97ddda17b3aff67efc92f873b90a00b5d3c8226357fc7dce76f9ccb0c757e1f3f3d77ab2c382b1f474dbfc9f"}], 0x47, &(0x7f0000000000), 0x0, 0xb9efff7f}, 0x0) 03:45:11 executing program 4: r0 = syz_open_dev$binderN(&(0x7f0000000000), 0x0, 0x802) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, 0x0, 0x0) 03:45:11 executing program 0: syz_io_uring_setup(0x11bd, &(0x7f0000000100), &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, 0x0) shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x6000) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x3000)=nil], 0x0, &(0x7f0000000040), 0x0) [ 769.078364][T18623] loop3: detected capacity change from 0 to 1024 03:45:11 executing program 1: mlock2(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0) munlock(&(0x7f0000ff4000/0x4000)=nil, 0x4000) 03:45:11 executing program 5: syz_io_uring_setup(0x2b75, &(0x7f0000000280), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000000/0x2000)=nil, &(0x7f0000000380), 0x0) madvise(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x15) 03:45:11 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, 0x0, 0x0) [ 769.155535][T18623] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 769.247051][T18623] EXT4-fs (loop3): orphan cleanup on readonly fs [ 769.263740][T18623] EXT4-fs error (device loop3): ext4_quota_enable:6306: comm syz-executor.3: Bad quota inode # 3 [ 769.310691][T18623] EXT4-fs warning (device loop3): ext4_enable_quotas:6343: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 769.325463][T18623] EXT4-fs (loop3): Cannot turn on quotas: error -116 [ 769.332420][T18623] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:45:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="8081000000", 0x5, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:12 executing program 0: r0 = getpid() move_pages(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:45:12 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000001c0)={@vsock, {0x0}, 0x0}, 0xa0) 03:45:12 executing program 1: mlock2(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0) munlock(&(0x7f0000ff4000/0x4000)=nil, 0x4000) 03:45:12 executing program 5: syz_io_uring_setup(0x2b75, &(0x7f0000000280), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000000/0x2000)=nil, &(0x7f0000000380), 0x0) madvise(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x15) 03:45:12 executing program 0: mlock2(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0) munlock(&(0x7f0000ff4000/0x4000)=nil, 0x4000) [ 769.787824][T18653] loop3: detected capacity change from 0 to 1024 [ 769.883655][T18653] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 769.997860][T18653] EXT4-fs (loop3): orphan cleanup on readonly fs [ 770.046734][T18653] EXT4-fs error (device loop3): ext4_quota_enable:6306: comm syz-executor.3: Bad quota inode # 3 [ 770.059991][T18653] EXT4-fs warning (device loop3): ext4_enable_quotas:6343: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 770.129313][T18653] EXT4-fs (loop3): Cannot turn on quotas: error -116 [ 770.138113][T18653] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:45:12 executing program 2: perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x85, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0xc00a3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x3b6af0}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x17, &(0x7f0000000400)=[{&(0x7f0000000340)="4f15a39a2df43b14ed5f2c578d4db055ee07f5a3d802cf8b50b4e7df21e18cb5fc59569f9e048c6343d4d93a8de61654aea60f37d00726bbbaf8413fa35f711e8ebd6b86b0d049ac43de63ad10d251b4fdb14d20706d042b10384fce5ec562f80eea2946c9cfc7f1078325732582af6da35442dfadaacf63643c41a7e5f882e09016d46b27739751f7cb3c9747d087919a9ce3b13b0c9a2774a54d8d5a2c5053ac2eebb14cad"}, {&(0x7f0000000240)="ae61a8d192171409dc2c19809ce70f90c61b402d89906f876fbb89196fa57c9dd7ed6fe73d4a9a050d32416a7e622c1c9943ab04d4e7db1546fab943d95d0a7057459e2d58c83e7f97ddda17b3aff67efc92f873b90a00b5d3c8226357fc7dce76f9ccb0c757e1f3f3d77ab2c382b1f474dbfc9f"}], 0x47, &(0x7f0000000000), 0x0, 0xb9efff7f}, 0x0) 03:45:12 executing program 4: get_mempolicy(0x0, &(0x7f0000000040), 0x1000, &(0x7f0000ffc000/0x4000)=nil, 0x4) 03:45:12 executing program 1: mlock2(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0) munlock(&(0x7f0000ff4000/0x4000)=nil, 0x4000) 03:45:12 executing program 5: syz_io_uring_setup(0x2b75, &(0x7f0000000280), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000000/0x2000)=nil, &(0x7f0000000380), 0x0) madvise(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x15) 03:45:12 executing program 0: mlock2(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0) munlock(&(0x7f0000ff4000/0x4000)=nil, 0x4000) 03:45:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6}], 0x81, &(0x7f00000000c0)) 03:45:12 executing program 4: add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) 03:45:13 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000340)={0xb, 0x2a1c5e08, 0xfa00, {0x0}}, 0x18) 03:45:13 executing program 1: mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x7000) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000000)=""/118) [ 770.446439][T18678] loop3: detected capacity change from 0 to 1024 03:45:13 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mlock2(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0) mremap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ff7000/0x1000)=nil) 03:45:13 executing program 4: bpf$PROG_LOAD(0x6, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x91) [ 770.525986][T18678] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 770.614661][T18678] EXT4-fs (loop3): orphan cleanup on readonly fs [ 770.651013][T18678] EXT4-fs error (device loop3): ext4_quota_enable:6306: comm syz-executor.3: Bad quota inode # 3 03:45:13 executing program 1: mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x7000) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000000)=""/118) [ 770.759880][T18678] EXT4-fs warning (device loop3): ext4_enable_quotas:6343: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 770.798105][T18678] EXT4-fs (loop3): Cannot turn on quotas: error -116 [ 770.804839][T18678] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:45:13 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x6, 0x3, &(0x7f0000000000)=@framed={{}, [], {0x95, 0x2}}, &(0x7f0000000500)='syzkaller\x00', 0x3, 0xc6, &(0x7f0000000540)=""/198, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:45:13 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000016c0)={0x18, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab3}}, &(0x7f00000014c0)='GPL\x00', 0x4, 0xca, &(0x7f0000001500)=""/202, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:45:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6}], 0x81, &(0x7f00000000c0)) 03:45:13 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mlock2(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0) mremap(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ff7000/0x1000)=nil) 03:45:13 executing program 4: syz_io_uring_setup(0x104ed, &(0x7f0000000180)={0x0, 0x0, 0x10}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 03:45:13 executing program 1: mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x7000) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000000)=""/118) 03:45:14 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000180)={0x28, 0x0, 0x0, @local}, 0x10) [ 771.523073][T18712] loop3: detected capacity change from 0 to 1024 03:45:14 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x8, &(0x7f0000000480)=@raw=[@func, @btf_id, @ldst, @btf_id, @alu, @ldst], &(0x7f0000000500)='syzkaller\x00', 0x3, 0xc6, &(0x7f0000000540)=""/198, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:45:14 executing program 4: bpf$PROG_LOAD(0x1a, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 771.596307][T18712] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:45:14 executing program 0: bpf$PROG_LOAD(0x23, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 771.655303][T18712] EXT4-fs (loop3): orphan cleanup on readonly fs [ 771.695210][T18712] EXT4-fs error (device loop3): ext4_quota_enable:6306: comm syz-executor.3: Bad quota inode # 3 03:45:14 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001300)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f0000001240)=[@rthdrdstopts={{0x18, 0x29, 0x3b}}], 0x18}, 0x0) [ 771.768532][T18712] EXT4-fs warning (device loop3): ext4_enable_quotas:6343: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 771.784338][T18712] EXT4-fs (loop3): Cannot turn on quotas: error -116 [ 771.791509][T18712] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:45:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6}], 0x81, &(0x7f00000000c0)) 03:45:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=@ipv4_newrule={0x1c, 0x20, 0x1}, 0x1c}}, 0x0) [ 771.959406][T18727] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:45:14 executing program 4: bpf$PROG_LOAD(0x13, 0x0, 0x0) 03:45:14 executing program 0: bpf$PROG_LOAD(0x4, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:45:14 executing program 1: bpf$PROG_LOAD(0x12, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:45:14 executing program 2: syz_emit_ethernet(0x6ce, &(0x7f0000000080)={@broadcast, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "8387d3", 0x698, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @private2, @loopback, [{0x0, 0xa, "d762483860bf9742f8c662cdccd87a0e1880252bbb5f5bea8f9156e85806fa49f850da5729a7903e424cb594d0f02faccf281966b6369390c32f5be0774b7fbeae28f4eaf8ff97fca5c37fc0c9e519c4"}, {0x0, 0x15, "851c3455e825e1d4440ce5511771d76046856c5f6c2754529ec5e9eca6a59d6c7e0dd99f93945a45879f47f6de2caba68346382b1dfff76676dff8d96505a3c6b2b1fc2f2b7bdf7ffbc3d9725c7ad4a581c28b2f79403f04e8f9dab70cbf7e33625526adc83f7f0cbe1a0b78bae4bffdc28d7abe1d4d7afe1099f9da000ac01a10e33872a17322b177b5a768fc6dcf5dfcd59dc332a3d81b2b9e85c64ce3246a14ad83b3773618"}, {0x0, 0x15, "8e5648b65504d064680d10fd4df31435bf9cb862b0d352a0ac017a9d6ca9f2c72c36127bf14290a5751b097ac5ba65f8a4661f952ce2eff7dbe8681c09e96343b3bf3ecc36148af52fd3ccb9d2373a9a864433d0e05fe7d6c893d05cc803a9536b2088eb3ca25627a8778b76ae51f1fd9c11385eb3e7e618d542dd86629831aeb8bf9c8a2ee2753004057e66f25f4ba986646933edca05a659e8c246904b41ced0f9f6a5667ec2a0fad7bc"}, {0x0, 0x99, "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"}]}}}}}}, 0x0) 03:45:14 executing program 5: getresuid(&(0x7f0000002440), &(0x7f0000002480), &(0x7f00000024c0)) [ 772.327507][T18739] loop3: detected capacity change from 0 to 1024 03:45:15 executing program 4: bpf$PROG_LOAD(0x3, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:45:15 executing program 1: clock_adjtime(0x0, &(0x7f0000000140)={0x6}) 03:45:15 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0}, 0x20) [ 772.397355][T18739] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 772.479843][T18739] EXT4-fs (loop3): orphan cleanup on readonly fs 03:45:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, 0x0) [ 772.521206][T18739] EXT4-fs error (device loop3): ext4_quota_enable:6306: comm syz-executor.3: Bad quota inode # 3 [ 772.534596][T18739] EXT4-fs warning (device loop3): ext4_enable_quotas:6343: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 772.550614][T18739] EXT4-fs (loop3): Cannot turn on quotas: error -116 [ 772.557500][T18739] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:45:15 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x0, 0x1aa897, &(0x7f0000000480)=@raw=[@func], &(0x7f0000000500)='syzkaller\x00', 0x0, 0xc6, &(0x7f0000000540)=""/198, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 03:45:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:15 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:45:15 executing program 0: fork() r0 = fork() get_robust_list(r0, 0x0, 0x0) sched_rr_get_interval(0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000e40)={r1}, 0x10) 03:45:15 executing program 4: syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={{}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) 03:45:15 executing program 2: r0 = socket(0x2c, 0x3, 0x0) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 03:45:15 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x20301, 0x0) [ 772.973385][T18766] loop3: detected capacity change from 0 to 1024 03:45:15 executing program 1: r0 = getpgid(0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000180)=0x1) [ 773.055196][T18766] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 773.108168][T18774] fuse: Bad value for 'fd' [ 773.131456][T18774] fuse: Bad value for 'fd' [ 773.141028][T18766] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated [ 773.284775][T18766] EXT4-fs (loop3): get root inode failed 03:45:15 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x0, 0x0) read$char_usb(r0, 0x0, 0x0) 03:45:15 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xc, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) [ 773.327709][T18766] EXT4-fs (loop3): mount failed 03:45:16 executing program 4: unshare(0x6c060000) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72e2aba000000012e0b3836005404b0e0301a08000000e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c000100000000000000497400000000000000065ecc326d3a09ffc2c65400"}, 0x80) sendmmsg$sock(r0, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="db40714d531db941d0f13c715c31", 0xe}], 0x1}}, {{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)='M', 0x10012}], 0x1, &(0x7f00000005c0)=[@timestamping={{0x14}}], 0x18}}], 0x2, 0x8000000) 03:45:16 executing program 1: mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000001c0), 0x8) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 03:45:16 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000500), r0) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000540)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="017fffffff000000000003"], 0x28}}, 0x0) 03:45:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:16 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "77962aa33c0d4912bd3c8335b7cdad69ae7119"}) 03:45:16 executing program 2: add_key(&(0x7f0000000200)='blacklist\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000380)='logon\x00', 0x0, 0x0, 0x0, r0) [ 773.750304][T18811] loop3: detected capacity change from 0 to 1024 03:45:16 executing program 1: prctl$PR_MCE_KILL(0x24, 0x3, 0x0) [ 773.817714][T18811] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:45:16 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$TIOCMBIC(r0, 0x5417, 0x0) [ 773.870357][T18811] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated [ 773.930621][T18811] EXT4-fs (loop3): get root inode failed [ 773.939327][T18811] EXT4-fs (loop3): mount failed 03:45:16 executing program 2: getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000540)) syz_io_uring_setup(0x1c6a, &(0x7f0000000080)={0x0, 0x6822}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000140)) 03:45:16 executing program 5: syz_io_uring_complete(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_setup(0x1c6a, &(0x7f0000000080), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000100), 0x0) syz_io_uring_setup(0x77f, &(0x7f0000000000)={0x0, 0xeef1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 03:45:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x34, 0x15, 0xa, 0x401, 0x0, 0x0, {}, [@NFTA_OBJ_TYPE={0x8}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x34}}, 0x0) 03:45:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:16 executing program 0: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x0, "83fbd0502bd378725e02340879f8e03b63711ca6c86a39109b4af0e1cc899b5bbcfe5d521d1e0b909a79d10447d24b9910a4a873c721c3c9fff3c624573accfa"}, 0x48, 0xffffffffffffffff) 03:45:16 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x6, 0x22, 0x0, &(0x7f0000002540)) 03:45:17 executing program 2: syz_io_uring_setup(0xb21, &(0x7f0000000100), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 03:45:17 executing program 5: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x15, r0, 0x0) 03:45:17 executing program 4: syz_io_uring_setup(0x5530, &(0x7f00000000c0), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000140), 0x0) syz_io_uring_setup(0x494, &(0x7f00000005c0), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000640), 0x0) syz_io_uring_setup(0x5484, &(0x7f00000006c0), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000000380), &(0x7f0000000340)) [ 774.417104][T18851] loop3: detected capacity change from 0 to 1024 [ 774.470019][T18851] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:45:17 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000340), 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000700), 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 774.519803][T18851] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated 03:45:17 executing program 1: clock_gettime(0x0, 0x0) syz_io_uring_complete(0x0) clone3(&(0x7f000000ac40)={0x24000000, 0x0, 0x0, &(0x7f00000000c0), {0x23}, &(0x7f0000000100)=""/49, 0x31, 0x0, &(0x7f000000ac00)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x58) [ 774.680991][T18851] EXT4-fs (loop3): get root inode failed [ 774.733475][T18851] EXT4-fs (loop3): mount failed 03:45:17 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80042, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x44044, 0x0) 03:45:17 executing program 5: add_key$fscrypt_v1(&(0x7f0000000080), 0x0, &(0x7f0000000100)={0x0, "646fbb4caf5f0275d29cc2896854f371e0bc34d44daa7cf9834a8407f03b8a4f131a6612c3ad81cef973311b65b2c7c59feac267afc042d634dbb688f188a185"}, 0x48, 0xfffffffffffffffb) 03:45:17 executing program 4: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000280), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, r2) 03:45:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="48000000271bbd"], 0x48}}, 0x0) recvmmsg(r0, &(0x7f0000000340)=[{{&(0x7f0000000000)=@nfc_llcp, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/109}], 0x0, &(0x7f0000000140)=""/5, 0xfffffffffffffcbf}}, {{&(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @private1}, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)=""/48}, {&(0x7f0000000840)=""/4096}, {&(0x7f0000000240)=""/185}], 0x0, &(0x7f0000000440)=""/166}}], 0x3a, 0x10062, 0x0) 03:45:17 executing program 5: openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='smaps_rollup\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000340)) read$usbmon(r0, &(0x7f0000000000)=""/49, 0x31) [ 775.088034][ T26] audit: type=1800 audit(1630727117.696:25): pid=18886 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file1" dev="sda1" ino=15134 res=0 errno=0 [ 775.138952][T18888] loop3: detected capacity change from 0 to 1024 03:45:17 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f00000008c0), 0x0, 0x0) write$tun(r0, 0x0, 0x0) [ 775.195216][T18888] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:45:17 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x0, "d3960910019569ea8a1a64d8e758d0099e97828eb8d43d87e957a4a5317ad19533d216d3cea8d2785dda672bec23a8318cd492c36fc2add0e3dd84c8c39eb73f9afa6ab15bc051f4eff617cbeba6cbc04bd4a31b6b8be47aed353c81b90793bf77e9d0a23e25bd8e8ce0438ac2052b2eca39be8d0753e618b431666628e6c97118d7d80e989f24fb985a64007abb51af94549cf910e9fc4da5aa7028b865f1e16d95b4d225affa9f052491e982083e4c477caf58c4f2321898e190926be94ec0e7820fb9192a32040fdf46b2ed358699765f40592a200b274f414b253bb8855af062bde5fa928ef93ba74a4fc915e177621f60d1761fc318d9f713b7469d9f10237124b72e9a8fd30df00562a4fbdb4967f0cf6a27168d2cb2204412b5cf5f04af1f06b5bbc26912caf5616a26c5104090abe67159d73ce40a8b7798b942d28b50d7e1e3bbb53c0f2fa9bec2fb5f63341c7ac198efdd3b7a62b34d4c986b23fb212a170bd31699fbad74e97ba57b3d9e3c3580fd6fc5cd46485e4763745158a3e4d46cfca82e7a16c3190b59de24c5f854e8557f86a5221c6c4de1753dd4aee63e35146ed6d887f761b8eec2be16f8b5a263069db892ad835400da52717437e03700bffbc261d6edb901a1f0c130650ebd316e43e924cd23c8cb158f5f3626db60afcf6b716ceef8e3c126953d2b51456fffbf49530698eae79f8b1fbe8188a4"}) [ 775.276042][T18888] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated 03:45:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000180)=ANY=[@ANYBLOB="e0000001ac1414bb"], 0x14) [ 775.392319][T18888] EXT4-fs (loop3): get root inode failed [ 775.427948][T18888] EXT4-fs (loop3): mount failed 03:45:18 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000280), 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x401070c9, 0xffffffffffffffff) 03:45:18 executing program 5: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffffb, 0x1fd9aa6cc99e9c2) 03:45:18 executing program 2: clone3(&(0x7f000000ac40)={0x24000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:45:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x6, 0x4, 0x0, &(0x7f0000002540)) 03:45:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:18 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x0, "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"}) 03:45:18 executing program 5: shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000ffd000/0x2000)=nil) 03:45:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_KEY_FLUSH(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001380)={&(0x7f0000002580)=ANY=[], 0x12d8}, 0xf}, 0x0) 03:45:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x6, 0x9, 0x0, &(0x7f0000002540)) [ 775.803777][T18926] loop3: detected capacity change from 0 to 1024 [ 775.859847][T18926] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:45:18 executing program 4: syz_open_dev$loop(&(0x7f0000000280), 0x9, 0x181241) [ 775.921908][T18926] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated [ 775.999961][T18926] EXT4-fs (loop3): get root inode failed 03:45:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) accept4$inet(r0, 0x0, 0x0, 0x80c00) 03:45:18 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000002040), 0x0, 0x0) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000002880)={0x2020}, 0x2020) [ 776.071747][T18926] EXT4-fs (loop3): mount failed 03:45:18 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) bind(r0, &(0x7f0000000000)=@l2tp6={0x11, 0x7, 0x0, @empty}, 0x80) 03:45:18 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc1}, &(0x7f0000000100)={0x0, "4a2e6609c9a40acbc523ab1834f5d0d9e5fe581e5770e72da83e21c6e9dc0bcd35c6419928f9d7d18060524fead746b30c6b40f05376749b2411d26ccd5ca79a"}, 0x48, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000040)='id_resolver\x00', 0x0) 03:45:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:18 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0) 03:45:18 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) pidfd_send_signal(r0, 0x0, 0x0, 0x0) 03:45:19 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3, 0x0, "6e784809997cd27340e4d85f3272bcac5ff8e8"}) 03:45:19 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='children\x00') 03:45:19 executing program 0: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f000000b680)='/proc/sys/net/ipv4/tcp_mtu_probing\x00', 0x1, 0x0) r1 = dup(r0) syz_mount_image$fuse(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {}, {@blksize}]}}) [ 776.475611][T18958] loop3: detected capacity change from 0 to 1024 03:45:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8943, &(0x7f0000000040)={'veth1_to_bridge\x00', @ifru_hwaddr=@random}) [ 776.543673][T18958] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 776.628220][T18958] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated 03:45:19 executing program 1: shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x0) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) 03:45:19 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSW2(r0, 0x5452, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "18ac6a6bc79cf463ff312b39020c4d1665e61a"}) [ 776.675438][T18966] fuse: blksize only supported for fuseblk [ 776.682586][T18958] EXT4-fs (loop3): get root inode failed [ 776.693702][T18958] EXT4-fs (loop3): mount failed 03:45:19 executing program 2: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, r2) [ 776.726145][T18971] fuse: blksize only supported for fuseblk 03:45:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00), 0x0, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:19 executing program 4: r0 = syz_io_uring_setup(0xaca, &(0x7f00000001c0), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000240)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 03:45:19 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xa302, 0x0, "29bdfbf913ca353d9d6f6e220c97652c300b00"}) 03:45:19 executing program 1: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040), 0xfffffffffffffcf6) 03:45:19 executing program 2: prctl$PR_SET_SECCOMP(0x4, 0x0, 0x0) [ 776.973389][T18982] loop3: detected capacity change from 0 to 1024 [ 777.057742][T18982] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:45:19 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000005280)={0x0, 0x0, &(0x7f0000005240)={0x0}}, 0x0) 03:45:19 executing program 4: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000017c0)) [ 777.149349][T18982] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated 03:45:19 executing program 1: openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) [ 777.199609][T18982] EXT4-fs (loop3): get root inode failed [ 777.205719][T18982] EXT4-fs (loop3): mount failed 03:45:19 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 03:45:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00), 0x0, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:20 executing program 5: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000002100)='/sys/kernel/mm/ksm/run\x00', 0x1, 0x0) write$sysctl(r0, &(0x7f0000002140)='2\x00', 0x2) 03:45:20 executing program 2: syz_io_uring_setup(0x5530, &(0x7f00000000c0)={0x0, 0x0, 0x36}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000140), &(0x7f0000000180)) 03:45:20 executing program 4: r0 = socket(0x11, 0x2, 0x0) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 03:45:20 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f00000003c0), 0x4) 03:45:20 executing program 1: sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x9) [ 777.583767][T19011] loop3: detected capacity change from 0 to 1024 03:45:20 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x77359400}, 0x0) 03:45:20 executing program 2: add_key(&(0x7f0000000200)='blacklist\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) [ 777.651876][T19011] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:45:20 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_KEY_FLUSH(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001380)={0x0, 0x12d8}, 0x1, 0x0, 0x700}, 0x0) [ 777.759625][T19011] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated 03:45:20 executing program 4: syz_emit_ethernet(0xda, &(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000aaaaaaaaaaaa08004c"], 0x0) 03:45:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_KEY_FLUSH(r0, &(0x7f00000013c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1200002}, 0xc, &(0x7f0000001380)={&(0x7f0000002580)=ANY=[], 0x12d8}}, 0x0) [ 777.808439][T19011] EXT4-fs (loop3): get root inode failed [ 777.814483][T19011] EXT4-fs (loop3): mount failed 03:45:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00), 0x0, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:20 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000002180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000003580)='./file0\x00', 0x290000, 0x0) 03:45:20 executing program 1: prctl$PR_MCE_KILL(0x16, 0x0, 0x0) 03:45:20 executing program 0: r0 = openat$sysctl(0xffffffffffffff9c, &(0x7f000000b680)='/proc/sys/net/ipv4/tcp_mtu_probing\x00', 0x1, 0x0) r1 = dup(r0) syz_mount_image$fuse(&(0x7f0000002100), &(0x7f0000002140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}}) 03:45:20 executing program 4: fanotify_init(0x4, 0x0) [ 778.166225][T19037] loop3: detected capacity change from 0 to 1024 [ 778.236733][T19037] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:45:20 executing program 2: prctl$PR_MCE_KILL(0x10, 0x0, 0x0) [ 778.306966][T19037] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated 03:45:20 executing program 1: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) clone3(&(0x7f000000ac40)={0x0, 0x0, &(0x7f0000000080), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 778.347743][T19037] EXT4-fs (loop3): get root inode failed [ 778.360149][T19037] EXT4-fs (loop3): mount failed 03:45:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_KEY_FLUSH(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001380)={0x0, 0x12d8}}, 0x0) 03:45:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 03:45:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf465", 0xf, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:21 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000500), r0) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000040)={0x58, r1, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_SECCTX={0x26, 0x7, 'system_u:object_r:auditd_etc_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'dummy0\x00'}]}, 0x58}}, 0x0) 03:45:21 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='smaps_rollup\x00') write$FUSE_DIRENT(r0, 0x0, 0x0) 03:45:21 executing program 1: clone(0x80859180, 0x0, 0x0, 0x0, 0x0) [ 778.831107][T19065] loop3: detected capacity change from 0 to 1024 [ 778.937467][T19065] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:45:21 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xffffffea, &(0x7f0000000080)={&(0x7f0000000200)={0x1b0, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_NODE={0x158, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x4}, @TIPC_NLA_NODE_KEY={0x43, 0x4, {'gcm(aes)\x00', 0x1b, "46db84653c605ca1deb7df86464cf204770324e5c2307cde324405"}}, @TIPC_NLA_NODE_ID={0x4c, 0x3, "0ac4b72f37cb5a5005b74869fb107fc53757ef3b3bdad78a479529c2e83d267de3029b03b06fea864f37379e4d1695bfe5ea9220c55fd1a82d25ecff8ba31288ccd3043ccf922219"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ID={0x9e, 0x3, "2039bcc282167a15400dc313f2b68be6e46a717d26478aeaefa0ba0924e554fae145976cf99b96b62b76b14346cd768c06590b2027e6bd4671ef2007760da94e60a76e45aa934802aa724897356edbe2113dff61581b89047563c3f1ab4ff81e176f95dd72c54afe64e7dce6767e91966977b7e94057c3e11cc31fb18f6d0d1dadaf34abac244537a63f5540877a8fdcd3fbc4864c350af2a2e6"}]}, @TIPC_NLA_MEDIA={0x44, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}]}, 0x1b0}}, 0x0) 03:45:21 executing program 5: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0250"], 0xe, 0x0) msgrcv(r0, &(0x7f0000000040)={0x0, ""/88}, 0x60, 0x2, 0x2000) [ 778.995859][T19065] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated 03:45:21 executing program 0: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$unlink(0x9, r0, r1) 03:45:21 executing program 4: clone3(&(0x7f000000ac40)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f000000ac00)}, 0x58) 03:45:21 executing program 2: syz_emit_ethernet(0x5a, &(0x7f0000000000)={@multicast, @dev, @void, {@ipv4={0x800, @udp={{0x10, 0x4, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x11, 0x0, @broadcast, @rand_addr, {[@timestamp_addr={0x44, 0x2c, 0x0, 0x1, 0x0, [{@initdev={0xac, 0x1e, 0x0, 0x0}}, {@remote}, {@broadcast}, {@loopback}, {}]}]}}, {0x0, 0x0, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}, 0x0) [ 779.135580][T19065] EXT4-fs (loop3): get root inode failed [ 779.182144][T19065] EXT4-fs (loop3): mount failed 03:45:21 executing program 5: r0 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) 03:45:21 executing program 1: syz_emit_ethernet(0x26, &(0x7f0000000000)={@broadcast, @dev, @val={@val={0x8864}}, {@can={0xc, {{}, 0x0, 0x0, 0x0, 0x0, "9266828c8d0460b9"}}}}, 0x0) 03:45:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf465", 0xf, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:22 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000000180)={"c32efd79e8872f3429b73ad078807e8e"}) 03:45:22 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20002, 0x0) write$tun(r0, 0x0, 0x0) [ 779.470605][T19091] [U]  03:45:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x6, 0x25, 0x0, &(0x7f0000002540)) 03:45:22 executing program 5: openat$sysctl(0xffffffffffffff9c, &(0x7f000000b680)='/proc/sys/net/ipv4/tcp_mtu_probing\x00', 0x1, 0x0) pselect6(0x40, &(0x7f0000005e80), 0x0, &(0x7f0000005f00)={0xc}, &(0x7f0000005f40), 0x0) 03:45:22 executing program 1: openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x42c3}, 0x18) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000015c0), 0x180c, &(0x7f0000001680)) mount$fuseblk(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x9005, 0x0) [ 779.574241][T19099] loop3: detected capacity change from 0 to 1024 [ 779.652984][T19099] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:45:22 executing program 2: sched_setattr(0x0, &(0x7f0000002180)={0x38, 0x1, 0x0, 0x0, 0x7}, 0x0) [ 779.710731][T19099] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated 03:45:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x2, 0x0, &(0x7f0000002540)) [ 779.755524][T19099] EXT4-fs (loop3): get root inode failed [ 779.766123][T19099] EXT4-fs (loop3): mount failed 03:45:22 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x141101, 0x0) read$FUSE(r0, 0x0, 0x0) [ 779.852899][ T26] audit: type=1800 audit(1630727122.466:26): pid=19110 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=14163 res=0 errno=0 03:45:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf465", 0xf, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:22 executing program 5: sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f0000001100)={0x0, 0x0, 0x0}, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000001140)) 03:45:22 executing program 2: clone3(&(0x7f000000ac40)={0x0, 0x0, &(0x7f0000000080), 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:45:22 executing program 1: clone3(&(0x7f000000ac40)={0x0, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f0000000100)=""/49, 0x31, 0x0, 0x0}, 0x58) 03:45:22 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) 03:45:22 executing program 4: statx(0xffffffffffffffff, &(0x7f0000001e80)='./file0\x00', 0x1000, 0x0, 0x0) [ 780.161335][T19132] loop3: detected capacity change from 0 to 1024 [ 780.186687][T19132] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 780.198120][T19132] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated 03:45:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000", 0x16, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 780.198509][T19132] EXT4-fs (loop3): get root inode failed [ 780.198528][T19132] EXT4-fs (loop3): mount failed 03:45:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_KEY_FLUSH(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001380)={0x0, 0x12d8}, 0x1, 0x0, 0xf0}, 0x0) 03:45:23 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSW2(r0, 0x5428, 0x0) 03:45:23 executing program 5: syz_mount_image$fuse(&(0x7f0000002100), &(0x7f0000002140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002180)=ANY=[@ANYBLOB='n']) 03:45:23 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x2) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) [ 780.599565][T19156] loop3: detected capacity change from 0 to 1024 03:45:23 executing program 1: syz_open_dev$vcsa(&(0x7f00000000c0), 0x0, 0x4d0a81) [ 780.653897][T19156] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:45:23 executing program 2: r0 = getpgid(0x0) waitid(0x3, r0, 0x0, 0x2, 0x0) [ 780.724630][T19156] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated [ 780.796742][T19156] EXT4-fs (loop3): get root inode failed [ 780.804571][T19167] fuse: Unknown parameter 'n' [ 780.811956][T19156] EXT4-fs (loop3): mount failed [ 780.851182][T19167] fuse: Unknown parameter 'n' 03:45:23 executing program 4: syz_io_uring_setup(0x0, &(0x7f0000000000), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 03:45:23 executing program 0: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) 03:45:23 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETAF(r0, 0x5408, 0x0) 03:45:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000", 0x16, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:23 executing program 1: shmctl$IPC_RMID(0x0, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) 03:45:23 executing program 2: keyctl$unlink(0x19, 0x0, 0x0) [ 781.146365][T19183] loop3: detected capacity change from 0 to 1024 03:45:23 executing program 4: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) clone3(&(0x7f000000ac40)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:45:23 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000200)={0x8000}, 0x0) 03:45:23 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000500), r0) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000080)={0x68, r1, 0x1, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @rand_addr=' \x01\x00'}, @NLBL_UNLABEL_A_SECCTX={0x2b, 0x7, 'system_u:object_r:wireless_device_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'veth1_to_hsr\x00'}]}, 0x68}}, 0x0) [ 781.231219][T19183] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:45:23 executing program 5: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 781.299045][T19183] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated 03:45:24 executing program 2: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x79d5e223e1a5627d, 0xffffffffffffffff, 0x8000000) [ 781.351469][T19183] EXT4-fs (loop3): get root inode failed [ 781.381626][T19183] EXT4-fs (loop3): mount failed 03:45:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000", 0x16, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:24 executing program 1: pselect6(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0), &(0x7f0000000140)={&(0x7f0000000100)={[0x8000]}, 0x8}) 03:45:24 executing program 4: prctl$PR_MCE_KILL(0x29, 0x3, 0x0) 03:45:24 executing program 0: prctl$PR_MCE_KILL(0x2a, 0x0, 0x0) 03:45:24 executing program 5: io_uring_setup(0x3255, &(0x7f00000001c0)) 03:45:24 executing program 2: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x2, r0, 0x0) [ 781.725594][T19218] loop3: detected capacity change from 0 to 1024 03:45:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="48000000271bbd"], 0x48}}, 0x0) clock_gettime(0x0, &(0x7f00000084c0)) recvmmsg(r0, &(0x7f00000083c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x10022, 0x0) 03:45:24 executing program 1: clock_gettime(0x0, 0x0) r0 = syz_io_uring_complete(0x0) clone3(&(0x7f000000ac40)={0x24000000, &(0x7f0000000040), 0x0, 0x0, {}, &(0x7f0000000100)=""/49, 0x31, 0x0, &(0x7f000000ac00)=[0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x6, {r0}}, 0x58) 03:45:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x6, 0x23, 0x0, &(0x7f0000002540)=0x600) [ 781.783596][T19218] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:45:24 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$FUSE(r0, &(0x7f0000000180)={0x2020}, 0x2020) [ 781.879268][T19218] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated [ 781.929701][T19218] EXT4-fs (loop3): get root inode failed [ 781.988115][T19218] EXT4-fs (loop3): mount failed 03:45:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/vlan/config\x00') read$char_usb(r0, &(0x7f0000000040)=""/188, 0xbc) 03:45:24 executing program 2: r0 = syz_io_uring_setup(0x9f3, &(0x7f0000000000)={0x0, 0xbaaa}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) r1 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000100)=r1, 0x1) 03:45:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000", 0x1a, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:24 executing program 0: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x4, 0x0, 0x0) 03:45:24 executing program 5: openat$zero(0xffffffffffffff9c, 0xfffffffffffffffc, 0x0, 0x0) 03:45:24 executing program 4: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000016c0)={0x0, 0x3938700}) 03:45:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x6, 0x8, 0x0, &(0x7f0000002540)) [ 782.382552][T19251] loop3: detected capacity change from 0 to 1024 03:45:25 executing program 0: prctl$PR_MCE_KILL(0x21, 0x1b0ff8251bbaf885, 0x0) 03:45:25 executing program 2: clone3(&(0x7f000000ac40)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f000000ac00)=[0x0], 0x1}, 0x58) [ 782.437556][T19251] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 782.501483][T19251] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated [ 782.531219][T19251] EXT4-fs (loop3): get root inode failed [ 782.545097][T19251] EXT4-fs (loop3): mount failed 03:45:25 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='smaps_rollup\x00') 03:45:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0x541b, 0x0) 03:45:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000", 0x1a, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:25 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSW2(r0, 0x5413, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "18ac6a6bc79cf463ff312b39020c4d1665e61a"}) 03:45:25 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f000000fa40)=[{{0x0, 0x0, &(0x7f00000024c0)=[{&(0x7f0000007640)="3536ff27a8c62acb001560ef2614", 0xe}, {&(0x7f0000007740)='J', 0x1}, {&(0x7f0000007840)='Z', 0x1}], 0x3, &(0x7f0000007a00)=[{0x28, 0x0, 0x0, "221570fc3739a5930312feaa5e8bbfd105"}], 0x28}}, {{&(0x7f0000007ac0)=@vsock={0x28, 0x0, 0x0, @my=0x0}, 0x80, 0x0, 0x2, &(0x7f0000007f80)=[{0x10}], 0x10}}], 0x2, 0x0) 03:45:25 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) bind(r0, 0x0, 0x0) 03:45:25 executing program 4: syz_io_uring_setup(0x5530, &(0x7f00000000c0), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000140), &(0x7f0000000180)) syz_io_uring_setup(0x26b3, &(0x7f0000000240)={0x0, 0x5749, 0x4, 0x1, 0x290}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000000000), &(0x7f00000002c0)) [ 782.940937][T19275] loop3: detected capacity change from 0 to 1024 [ 783.019559][T19275] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:45:25 executing program 0: mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x33, 0xffffffffffffffff, 0x10000000) 03:45:25 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@local, @dev}, 0x10) 03:45:25 executing program 5: prlimit64(0x0, 0x0, &(0x7f0000000200), 0x0) [ 783.100188][T19275] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated 03:45:25 executing program 4: ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, 0x0) 03:45:25 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x2c, 0x17, 0xa, 0x5, 0x0, 0x0, {}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_FLOWTABLE_TABLE={0x5, 0x1, 'syz1\x00'}]}, 0x2c}}, 0x0) [ 783.165908][T19275] EXT4-fs (loop3): get root inode failed [ 783.175360][T19275] EXT4-fs (loop3): mount failed 03:45:25 executing program 5: syz_emit_ethernet(0x5a, &(0x7f0000000000)={@multicast, @dev, @void, {@ipv4={0x800, @udp={{0x10, 0x4, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x11, 0x0, @broadcast, @rand_addr, {[@timestamp_addr={0x44, 0x2c, 0x0, 0x1, 0x0, [{@initdev={0xac, 0x1e, 0x0, 0x0}}, {@loopback}, {@remote}, {@broadcast}, {@loopback}]}]}}, {0x0, 0x0, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}, 0x0) 03:45:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000", 0x1a, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 783.314492][T19295] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 03:45:26 executing program 0: r0 = socket(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x80, &(0x7f0000000200), 0x4) 03:45:26 executing program 1: syz_emit_ethernet(0x5e, &(0x7f0000000140)={@local, @empty, @val, {@ipv4}}, 0x0) 03:45:26 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write(r0, &(0x7f0000000040)="5ce15b19d8744b24ea7640", 0xffdc) 03:45:26 executing program 2: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r1, &(0x7f0000000100)='}', 0x1, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x802) 03:45:26 executing program 5: open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) link(&(0x7f0000000080)='./file0\x00', 0x0) [ 783.535217][T19303] loop3: detected capacity change from 0 to 1024 03:45:26 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1003, &(0x7f0000000000), 0x4) 03:45:26 executing program 0: mlock(&(0x7f0000ff7000/0x4000)=nil, 0x4000) msync(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x6) [ 783.632643][T19303] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:45:26 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r0, &(0x7f0000002600)=[{&(0x7f0000000480)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 03:45:26 executing program 2: mlock(&(0x7f0000fec000/0x12000)=nil, 0x12000) madvise(&(0x7f0000ff0000/0x4000)=nil, 0x4000, 0x6) [ 783.709929][T19303] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated [ 783.781869][T19303] EXT4-fs (loop3): get root inode failed [ 783.812039][T19303] EXT4-fs (loop3): mount failed 03:45:26 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) preadv(r0, &(0x7f0000000340)=[{0x0}], 0x1, 0x0, 0x0) 03:45:26 executing program 2: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) 03:45:26 executing program 1: r0 = socket$inet6(0x18, 0x2, 0x0) getsockopt$sock_timeval(r0, 0xffff, 0x1006, 0x0, 0x0) 03:45:26 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$unix(0x1, 0x1, 0x0) poll(&(0x7f0000001380)=[{r0, 0x1}], 0x1, 0x101) close(r0) 03:45:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400", 0x1c, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:26 executing program 4: syz_emit_ethernet(0x46, &(0x7f0000000140)={@local, @empty, @val, {@ipv4}}, 0x0) 03:45:26 executing program 2: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r1, &(0x7f0000000100)='}', 0x1, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000240)=@in6, 0xc, &(0x7f0000000480)=[{&(0x7f0000000280)=""/86, 0x56}], 0x1, &(0x7f00000004c0)=""/40, 0x28}, 0x802) 03:45:26 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r1, &(0x7f0000000100)='}', 0x1, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) 03:45:26 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1002, &(0x7f0000000000), 0x4) [ 784.214766][T19337] loop3: detected capacity change from 0 to 1024 [ 784.273761][T19337] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:45:26 executing program 4: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) close(r0) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) 03:45:27 executing program 2: r0 = socket(0x2, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000700)={&(0x7f0000000000)=@abs={0x0, 0x0, 0x3}, 0x8, 0x0, 0x0, &(0x7f00000005c0)=[@cred, @rights], 0x30}, 0x0) [ 784.386779][T19337] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 784.417060][T19337] EXT4-fs (loop3): mount failed 03:45:27 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) select(0x40, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x1d}, 0x0) sendto(r0, &(0x7f0000000200)="97", 0x1, 0x0, 0x0, 0x0) 03:45:27 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f0000000100)='}', 0x1, 0x0, 0x0, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:45:27 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) readv(r0, &(0x7f00000001c0), 0x100000000000016e) 03:45:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400", 0x1c, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:27 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) poll(&(0x7f0000000040)=[{r0, 0x1}], 0x1, 0x0) close(r1) 03:45:27 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r0 = geteuid() lchown(&(0x7f0000000000)='./file0\x00', r0, 0x0) 03:45:27 executing program 0: syz_emit_ethernet(0x42, &(0x7f0000000140)={@local, @empty, @val, {@ipv4}}, 0x0) 03:45:27 executing program 1: socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_int(r0, 0xffff, 0x1007, 0x0, 0x0) [ 784.756755][T19369] loop3: detected capacity change from 0 to 1024 [ 784.793695][T19369] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 784.823349][T19369] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 784.841332][T19369] EXT4-fs (loop3): mount failed 03:45:27 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) close(r0) dup2(r1, r0) 03:45:27 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) dup2(r2, r0) poll(&(0x7f0000001300)=[{r1}], 0x1, 0x0) 03:45:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400", 0x1c, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:27 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) write(r0, &(0x7f00000000c0)="8847a36177e4beea0f4b3ac20c5374ebd02d6f769f9b178c0273f48ce69562614c38ebad21bc5030796403dc90fa0f53aee88fac4125824404ea538fc031d98b944e32b4012b836b2ae035fab43f663533049aca4d58e5ea7069ccce93b0f437a959730e5f12e7fbc2cf196a3eedb1931d31a5bdc9e9b100e4f8ea34bb4606424940ca838607f1ebfd51311183fcb45f5cdb504734c1cca62618674fe7a5ce0a", 0xa0) [ 785.138268][T19394] loop3: detected capacity change from 0 to 1024 [ 785.183566][T19394] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 785.227592][T19394] EXT4-fs (loop3): corrupt root inode, run e2fsck [ 785.250337][T19394] EXT4-fs (loop3): mount failed 03:45:28 executing program 2: mlock(&(0x7f0000fec000/0x12000)=nil, 0x12000) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) 03:45:28 executing program 1: mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4) 03:45:28 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCCONS(r0, 0x80047462) 03:45:28 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000100)="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", 0x171, 0x0, 0x0, 0x0) 03:45:28 executing program 0: socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$sock_int(r0, 0xffff, 0x1023, 0x0, 0x0) 03:45:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:28 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) close(r0) ioctl$TIOCCONS(r0, 0x80047462) 03:45:28 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1003, &(0x7f0000000040), 0x2) 03:45:28 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002940)={0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000000300)="75b90d304aa3a7146c03934d92a38ceb07f48099162bc2facd6c0dfd48f32d0bd818f521615dfe26ecc58b259bd7146d712d3df4d57a6435636c0030dc6039098e568c3c94d99d1afa4dcb51c572c28fc646513dd5ee585af8a5ada22f67fb059011137cf5b9caf4a249048edfe2dab3214fb589a69287dcb6b9b39ef6a6840c9fca862def19e405ffd718a7c3097ac95b99e94ee2d2012f33451dd19c37566f90f815a6bfb6d4b84ddee9aad2c969f3f3dbc8da329a349d150e73c2e79433183acc9c39", 0xc4}, {&(0x7f00000001c0)="89eaef62ce3695924c3fd7e1138b6308f4d5fa477af1bc40e6", 0x19}, {&(0x7f0000000400)="8f9c28591af0631b6dbd4d0fee50136047921d43d4551692", 0x18}, {&(0x7f0000000440)="70662ebe5480bebdce7c55bcb87cf966a93981cd415b37b5051fd8f5c5659c481a494ca74d57da80fd28ca003b3d53e7b2cc68cb38dc5563a73c3a8bac60ac8228aa16fc8bf016", 0x47}, {&(0x7f00000004c0)="3cc1fe5e1886d32b43940d3e0694f88a7069eb509c888cec60c22008affbeb58df3c42b8ad306ee89d4d8c0804ee09f1df6c625b02e7fd827beb5e6d94fff602bfb2", 0x42}, {&(0x7f0000000540)="79af6d625529b1a6c0b3495aa13291bb0fdce987001b67b4070c776e8a841758b75f438cd4bb8b36497dbe3a678fd04b31acfa855be1e665dbaa78c1640787fa6464dee1ea317a1e1d955ba39c64ca00e9b644595ad329d58e6879e376943ebcb6af6fe627f0335460112da4bb9059abc217b7992b1942702359de98dde06d36424ca9190cf986876ce059558c2bdd2686cff9178dfced7ca3bbb7a2d215e863fcf1cde2c52091edd00e887bf584475a895c153af92a431015ae42452e20d1707ad5bceafd1dd6c9aeeb7f16396f2d20bf4a48e451c557e2ada8648e04b67df4297394e0e05b373372f5b8c5ec398bacdb3c4600926fed660215f6b66b92fe3316546fafb9df33e8f8355a6ebfe385be76833ec3ef92bd8b44dbae9726f3f7037e9ea230d83ef1550c61051d1c2db47f53bcf055a051b144003e20073ff66fb225e4ce4a3be48778ecb761327503fe2e7f7003a96718219403229532bb4328d47bb312dd43a9b5fcd6bd9bbf0148307513253f68fcceb0e928195f0c8e65632314b60b9361054bdda4c06fec0ba0c7026a5a8775b54525f8a1f5cb49b85a6173b8d20ed0f8a08851859890b1e94c07a5a4e27044fb55bcb947eaffec976241956a78ad289a41bd6053e90358d80d9b19e0e0047b3e7edb93982b403cceb66894caf9cb1625adfc0de7cd805a536a53c60e72c03c2d3836b7309bbfb800298d725ea7a512396ec4500d3e4f8263cb3e805bc16b6c3aa9f6f9f83a721b6d1efb0b91a1c7d2d02d985184ce4c188277907f906afe6450e0eeec406540415fd4dae4ed3c593de2a9559f4ef21e8c6a9bf857b0a75fb9a8a979876fee7714dbd33f78deecd359d219bee1484d7d36644dff38b0653a12f8aa5dbd084e2c254319a0e8d557b214248804fa66e754c69c5eb194d00f3b6674476a26871d82d3f3939a2b66493b71a72f64428dfc9867ae825b4b29fc2b69a3227516b9fe7c07452809be5513c997342fa91dcb758fba7df10e04ac2111d841ddb1e1ba3281e0384544dd6589f91074c4064774f281cc67acdcef63c31058131329a0c89e70536f3bce4fb7dc55855cbf2607c6b917b53d488416cf74e29f3d7c7fd9ff4f847ea2353bb85618ab69891073a4e47851ab8b9b3fbb56da851897281046fae95c50ce006bbaf3254bdfc0881360e1f82a2d7beb81b621343decadcf0f57b445a8891f68ce0eab1f561999dc9172bcc95d36f76191b5fb1cb0c2eb90a502bcf6e4a42a5c517ed652951251e9ff6a1e0e6b4852f898f4a5c5ad5365d5cd053887ee93bd0c11d6799e59774bfcc057dde84ff7d6f2c21a9c6af2a389c8c46765222f54abd656d6fe3bda6f12591f4cd355bd7e4f769e1de4957cc565e418d2362a821e20e01422bab7b572dd8dba56a1291f8d810048af38edffaf569abda83d403b3927c91f95c1719409f99b65ae3859505a9f77e17232272050db19786df2c5a6ae187fddee8e7c9d7ce0fbddd3c302a85c8c3e4e1b995a93eae764a40ccf25b42061f42f09b422f0abc69435f8147a43afba22c67a2cb3617918f73f44fca0b12b57085ddf5dc646765b71201d9604c70c545de929d0178b91c38fd589ac2ee5cb55f26d2356c2ef81f083e229d1080e671bbadce1e9d5b7e5f23fd540cf5f50cb1d2ddd8630ff038ffcba751bf75613592eb563c27ed8570120c4832f4655fd2bca166aa0066fc3c5bc47a90db4e25994a1ab0e063b384ed3197016289aff7a0197f05e737497a9a14e6adf7fb98af11e7dd175e531f61e29ba47b3427323fd13201c2baef8735ea6dfbbdc4ba5d6a7e9bc82144991eddb372c6fb11fadb4609582a9363786fbbf557f853644e2827f24a026838a0f9f54df5a92dc970544e3e0a2d01cb4a5936b07afeeac19fe51f21bcd3ee393ccc57b03bfef34fe9784ceb3eb88717d578239be383efe05fe1355ef73db1e2d543f6684f2da4b1f6c1a826a418f163f417c8015a13634ba02fed9706694aec3fddcdb87aa00c9dc122d58dd678774d00734b5786e06a0b739fa8dcbb69ee3feba6debb05f0c122a60a0e032c1fcc40fe1d5f2f1deb13640f9a48cf48d5ccc65bdb731ae55614a6603998684f0f229e559d04ba0bc19da35360548cdf930e4033922ea0f771b701706a81dae2a8ea8ee838a6d69257a9f912bc31bd405e236c819eb17e86ea322416ed42a52c0135912856c5ced914bbb84746b33b00b20c61bcc02c1253a98576d6e64a09f05b5483d42c412326c15e97dc124d264e1ea7f54a1a542c1a16c96e959398a19e4edd3a40460ce749e249e6d57e7de6d2acdfba4a577d314d7b1abf0caa5c26d6e51c9adaaf1bc477fcfad0e2215770ea88fabb09ad4666879464204e0b61f3b64969e62e5ee88a11bdff9dd5755dd13ff2e01a18469adcd6fad4b9c57eb25e4d4147e41c501e44622802aa82f28ac3490ab2594266d66b581b43be36ede6fe1e7fa802327ac382231378b1b6e1200a23ecdd412bb11b63edf9259aa9587d165fbd6b715023cb1e7c9ed36676e1a014b638d5026c7db8c8e2da9aae5e628efe6ea6f833c37dcb0d33018b0d724c869ccfdce19944bd43f765da8735584ef6ccba06a943ab276a40f8f191811f75f831d707a9a7a3460eecc791f585da1be37f2800d9978c8ff4b217c7eb83bc00022479cf9366592e098fbe450444b22b77d61166104819f64cc539a0ef58e724ac96294f1dbd94cffd117d95b67b35306f519dfc443514406dc1556255f4155d2d2ec7947296a2860f1479150dd90622508c99c71ac5823bd27e60b6db34aafadda99c0f242d2812b85d7216ea096c2b192edc4a7eb6711a68208ecb56f3de2484ed67695bd7eff0233e323fb149e49c7f06829b39ddb4670892445804a92a423528703dfd57283eeed11f4dc1797074e4dc348289c32fbb9cd6b4064eaa389721c7c43b7d540f4698b06357a7eb471aa4c5abe27b473659774fc8f38deaa5bccbd66fc856dcd5d9d851b2bff301fba150daeab18691e05a1c9144718b18320bd923cd5b7d5b263dfe7bac59fc02710ea53e35af50bbbd1eece2a469fd4b9b755688981dd7cd184618906ecf17b63f313e9ce18dd2f1d9e5e313d2dc2d829d7256bd7045f19e4f686c77e82ec0fb97be0ecb7d94cec2ecbf7d5906c2fbd357841933397971551d0f7d2ff97b75e7eef721b48ea8a9fecc43e7204a7ce7cc2ab3ac03a7d7057863c770ffc4e2fb94ff40184b36c14f8a36c88a44fc31cd96bf327dbf0962a542145f43df8d2901ca17dca08269b81219a73683510911e8446bfb483dd6e6ebdc3a0626f4e1f7c475982f9540476c3dafced2d8bbd3dc196edc7714c8b2792396f841cd5548fe9e274312c31b83db39b700a0f844e0861679f3abc61713bfc3f31f99130f7bef2fe97ab10a37dac59f40c8f13b317d37677e4ef79b651b1748a578f11642bd3baf559a8232009f315182e4728711920040372c376305a49b357637d8d2bab5d851f7ae80f18ece49dd8e1e442a844fd3b28cfba9e2789b010b17e0e64f2b9e0b17be0ecf5a2a9959c18b5b69d4a6c0d8d45d1c8b9d5af3ac563ecec95564c600e82d0c9a153a0ffc0c19c8c198d6522ae700f22c6eefefa967f20045ecf359fa0ac3b90fcf17761438378df6cdb496685dbcc4f5864c819de54a3c6f93f567e31b547f852a1478559d5ce6a236a5b038eba29a2d0cfca9a3442daff2010aeb8525fe0b5b7da753ec56e80df0d401ad4d97b879783b4359812251e5ef820792a20f96eee877fa999d82f3bebc7fd705ba895870ac88ce734819ae8751a1ae992522ae88e3cd3757866e7efee040df464b1645026668a1c8e61e375cccc449c185024be88d024dc73b3d15d0547a173c40e0840377b4ceea3b9503bc1cbfd6ee4bd6238ba0d81817ebccc836cdc8e3959b56a3235557e2486116d9c1740a3365e89f038e4b288ed8c6ae3024b1dd2830e38385af5357857ff19a5b722539810523168ebef0f7dc84be6c54a17d9ef3c645dd6247c2330880f7794536fb26c7200c504cb3f6aa14e52b9ca18e138fee625fbf46181b98d1fb7dde01245791fb98abdddae2b26833cdf92d7ae62a36fd3cb92bd530790a770a093e6b3751d0613abf17bf9519faa50b6b9ad99879308b197af67b9237165ee17569ccf9d5a151ceca30117805fcd03ab0f7e871501d857aa2840f15adbc7fb08b2d56b0bc3589cdd4625957d581ec7d02ad1ed84501b4cfe7ff05e7ae94260d8b2e4cbef353e5f65c2a6b450dbf8f94797c5df4f75e3d0e45ba152b2715f33f508135c94d10861f34e0f1356565e71399e40b4c58959c43b62fcb3af140dd1a0e4ce618f77c930082eb320690e215df5d7fa89facb98954b7a01228917982ed8fd64d3af0a93d0ede03ec21a1fcdc524282d4bf1ba1e7aff4697cd84141adb14b6a6b6ad38845ef5a7cbbd03d4598ddf79796c2bd3de4268facd007519247ed25eb3db0c32d80f7478ce4e4ff80808b3240cc62050666d9986bdca51b668c42e0a5c7392c6ea87e34df65f0bc5b9ea48ed2406f307b619aaa6cca3e850296737ede97da726af91a90908f5a9355105c07633b5794cde2c7559cebc19318db6d9f54930e6a4ca466df8eedee5fa92db3908eecf92eca69a08fb4ab17dddc32d7ae17f3bfa695e75230f44308e85e6d899ddf80260a1c66c13589e3579e072edd21d140c80092672155f208484d4f180857241d3a831ea8d3f116feb9bb6fcc4164613bc55f7397c52adb3bb300a9817eaa580d1b03e43ec8557137318984354d791c5448b94f07d03f07e7b7f0c02a746f8b9f1d480bb93972d01c1f27b2c58a684319cbfc3e33173d0e6bc0ff3e1706597a9cbb5fc6e3d6d4a9c4b728081188048787b788dc366339d51fd35f204bb7ef8233eac91ac1082d7ae771898e471c828ff6a7f13c140d78855f8ca6c8c09f90f9c4b2117fa7a23675d108650a5f299a72aa8d2805f891df052205cc4814470878fd0c4ee5662f5d4b111504be8aa32d5d88b2aa808923d0913cb104ae16e3df968953cd2c1099e63019f0c5581ee8b6f4903c6b83ea3b338ee1c8d98a74217a40b985d9b5625f105be9a6dc735c933693d3109e7914f50e5c6c0c794af435cdc25633138c71dd8f4ff662c8f3d8e1ffe0115a3b8a0373a956b69c9760a7df317468acee4592bdfffa42e908cdea28c145949699db0c4c24a4e6bcf14d92230a10e2b6758582eac75f270d3a721ba6dca6b58d548cc5b1eab0db76a4045a540ad9469359707c3acca6ad51150ce197224afd07631efa2b74d95b14c7225c3ea41942b3d5e55293ba488ca11efeb5f67adeaa87efa276ef3f1b6ac098f595917a56d4bf939eef80fdbbba4d6c489b04fccfa2296ae7539afeb34bcd70936309857dccb93e0c1b3390aadfc1b3ab2195c267710bcec636b12a758aad45d5b4165be24c350a4e5b4fd81f5084e1b4f813860d5f13c27e1c31de0e3a49400a26ed22139d01daf82994a9a96449e8ac12a25dc1720cc90aeea2c1d258eec1368d66b180061b76925b390d9cbe44a3c63dc9a0724c694f4566e8b00832903810d6315cee8017a532befd53136e921ccd9ef68445d6322a0d4abdc5f30227a6cbf0b5fed9b1b96193452b3311f254fad941c3705f21ffe26140ab32b46eae213f715112b16845131c586d0b90f882d79cbcc481bdd54ee208fc9f9216198bdf35f50f710789fa4ec3795b98f3c282c8aa7d9a28f21e6d8bc9f219661d8f097db8007a9720aa6", 0x1000}, {&(0x7f0000001540)="f8105d624d55bb7afe5998c25bde5421983c8e027868a843ac28f8729827b66787d36fb7dffa7a50f4e89067f743af2e03a450a252ccd05fbf09c73099e09389d698cef234ef7dabd544aaac63782642bfa35e66a78f7ff9fe238d7254f38e994d4e2dbc31e36d01f346b51bc61af50dd9ec7ef6597cf27f7a81a5a08162ea194873499bf1f0384b40cd53fff1e90ba37bd59cf2fd7dd10f35cb8ea78f9ceabdada0dbc65db2b8fbde0a60023fd436506fe71e9be99b592b88347d90c10457", 0xbf}, {&(0x7f0000001600)="585ad777c1b6842a6a747f2102f587d11e24df9c069bfc6d564644ac474f3b3eec913440dfadcc1a62684ee871485641c747a7687230e88736f9567de0804ceb0137ea4066f4f22b584380d8a2e57646a50fafbf7b7f653fedc300b9347d5c3dc55814675407aa5913a1f0924f255a78891cc06e53d3679956db603031a83dde60f478175580ae8b03e9c64856cc39c2cc8bc93d25ae432d20753f443ad97bca515a81e1419856259a9e2e4156f9acf5a6d8918f3fae67b26a786b6b00a90a5be2864474cb74b7da5697dda943ad372957ee30f193a61e6206231ca16ba5ee166ce090883ffb3511e3ae741f4bd5eacac56ab2701a8f67f60ac2b9a8faeae149b203e626ff36c590584424b65bc5ddf58e815d588424cb52126cefd34df2cbb9070746ab75f60440caba69e581f22b9b6f0e0ca1ffeb0dbab67eff671dc3fc8860ec9655fd8f67ed7a55f77d92eb347831eb1afd387c061e42dd94b29d29b630552d3d288a47c7811d42b12149fd777e9e5d1607c6a4ffbbd1b346ddcae4deeab5b1494b162d76f7bb3db41dd0523e9fb7518c53975c292096aa9d0a074edc962519e184b82407dcef7c549465d31509cdc9c22925edc14e9833c5e5a9decd1cac86d20bdf3397f71961bb1b99034e5afd345214d38a7d7f0bef7870331a45051b8bddad9d69ebc80f6a9c42e32b484c7c146f0f823e1ec38338a202b898231886f74d1f720ed51c12d1ddafb5d4d65f3f0b7fd8a579b86b30daa60ed0a33927907f7295a4c5f11e510456fb76c9c768ab058517bbaac192e75a5653a32e930761ccc1c49dddf56dbdf55335b88daa1b234a88f08086c4e57e3b5a4fcf87f58cd20862dbb3bca67192c2ff96a824fbd45534ca43c386b41ec762eff870853b6310d39df5b493bf61231f9bb7252025a6315d1abc7bfeb5acf011ba949d1c3e3fd6a192f3488988826317833ff07e9482a6d4d95d041e64f59fef368811c110db62e1301731d046d4f088c5140a035756386df426df47cdeed27a91edc4d7e1ae4f764ba89482168168d138ce3c6cdc1291e5c9035ce1960b3e4faed61c5ef69aa6fef5b1a8d864b961b279f8fc648dc9f018878cced9c03f957e3cdd58c02fb8e583804a4d5d540e030d83e9bc07cd9015c171053cc227f8426ea5c2a064df34493c8ec412f0bca5415c79a1288ef85971133ddc5405d4ff30779d4d1f99d65d1e0a70872746161d29a2f1b515ac7d830e2f61e7ff7f0fb8dd82954c8874de03dc9bdf3f39c8c77fd8314870eb9b20ab721c759ce0c24d75e02287b87a21a88592c8b2174be3eb2f02e88e4d7fd194702bf09eca6f4ea7cb5ff8ca2069a6aeeab0e3fc64a4cb9f813750107f858840ae3878e8f7bc308b1887366690f8e9ee0c0782b80a54553e882b87986140037699ffdbc9e305bea2ad2c05dc3f1d1902012b736a812763bd868892e314aa3268c36369281b9e6a27fcec279722d7c9803a4fc32367c066d1daa1519ad5e0a71a2ded389754d5cadc5ffe7b7db604020de91cf36f0e6e278b3762dfb189ede9b15c48b94c100331b340dde35f323a4ba67f50bf33b0ea2922e7d00d265322f6f815699de21601dfb246f7cfb1c1594ed40d0380c506acf19e60bd347d0c1550dc8a0861b39aeafb5aafd92e84eb9f7ea3827833e1127ad52f0b6b34583f46253cccd01bb9339d10c86a6b5c375ed4755e67788ecb528715bf3a8d5e8f7245647a031f7a26c0ea59e967e426498104c1ec5081d56e9d8b7b92af3823ed8bb01e8f206a213e330809012e9ae61b357e7f424d3a91ce116d8e4006c5af45ccbeb29ca9d605d06e9f8b595c75be1bf4d6ba0dcaa494805aebe53e1785b13ca2262e20b9a744e903ae8e54a354333e5eacc25569a339e12cd6ec4c4531364aba23e0149ecee5f6cbef0533c98611b6cde7e383575b3e6af5e967ea14f357dc5c97c8159797d84c018aab69b7660deb7f1451afde99eae82f7355edb5547bb96ec926dee9cf748601c9d4e9e0cf62f61d71f58526c69626c68ba7a09b0b53d0ac7998d71496b50f36184fd56082088278d81c835ad641a3e07ab42df20c5d114d0a51f96d96da75cbd196ce9dbc22ab18e72367569ffeba6088b2d9c2982c97351d256c5e6df6724f5fd9f173d2bfdc68ad59a322e81d398a16f439041629339b0713ef6e3dd95c3e601559a0fe8fd0af726c9d4c8cd369753a3f0d91ad863da17d166845438d8c3c8a76fec64deb41358c143b273b604f3d58ec17802bec957f61225b55456d1de6ea7899794b0d7668d325e2401139661e2ead8bbb5c6926600050a7e6c18459095f1063d63b8a79b3261703655abb3f0c675b850a0801e2cb262e7f9c17313ebdfa4fb5ec31d232bd70d610fbdd3e82f529540b4cbf81ece4062252cddf12a729f73ee77e7f6a850af8201728d4c966fa5f3a37a66ea95ca46ed132ecf8b957a4bf2cfb24c2be1f6b9bdf5ffced5be022bd6ff78bd13a2ec168c4ae70b75399a45ce361b3f01c1837b4c0a7e4914f09ec258fe45ca72aff228de926743ea150d79adf5ea5604e870811667a67fc092be4531f50e6ff8d021513ec70bcc7b39454cf24a6f1b8f70842636967ea1bb22a17b81d2536ea3b76f2531c34a5497a9457475a1bb166462213fea47096e7147f8a752b7f5e2890d9341a70cfb845e2a806aa8809017a775efc1a0d1b4b7a42de44ee9e27e888782d9fe146d1aba944beee9abcffda3e475f8e8e7c9823d6f85e14aa4794e6227c8c559e8575dee0d30972fa5d1e925e764ed3c8897aae0b49089090e253dad55bc61cd30db7af0020cbf1a5c9f19db3592870f61db0ccd6e0e9cafaade24fa07b2ce8927ac92e70745daaf7a750c7edc8579fb7edea7407de19244cfc7f6c06c1c991cf8bd53d9aa085213bfbf0676529a3d83f1044fcb5e182cb8bc7d26b02729b925a0ad3114172d5fd7a21bd0d09aaa5e9397b4310ba81141c06a8e63e1e4f2c2567d0c8d4e08d018af0a990f7f6c6a3244cf73e1dc28304aa4c805f32db9ae22a26ed13ae6f4453df9fcecc7deef8404ca1b7bc5b8baf57e245b719b788b818dc1383535ed8077f69bbed6575d4caadb9b41c6e0d0bf88217dbb13d2ac7d3c6c1b1ead1de90f3df498c43c0dff499e4607b80c5861846f2381f85187afb84d64f246f703b32655267a1f4b88f654e0fec34d672126a402c324c2bd3fa9e96254f9f75bac7fd149ee419af991421d3399cbfa275a66df36986fe03f31048d9ac5ec209bbc987ae071163347afed78bcbc1b2e6b4a906019be45b73a15e10c1cd11a971fd3db60c8641f786ec942922dd3771ba07c16d2294936d72ac8f47376c0eade7ebfb6354267000675bd65b3686e0e60fb55923e97a2619d5053722f5e9310e726b7dbf135a9e8aab25bf8162a2f490a0550fb79b28a6ffefb5cb0bf00e53391173840f1f032606eba9d1ae90fa7c467a6d6e11031e3786e0244fb14abd00d5e9c2b7879f50c972f663a471e9e6c5662180b9f30f7d54740ba2e970cecdffd04a390b68c04c9cc0298693f15a81f05c3fbbeb7e10a94105c9dd410792eef13306811c56282ec7ef4c051141fe25b4cb389890c05b28492bae96bc90ae28d7213481557a766663e31c95528697ad74e83cb7c6138f3f98f3b60e505a9ea89fcf6996b5c9d1f240ad4d1055b83832c32f593dd31e9fd680eedad68c10560b6fb13be87735cacc8c3abe399a579fd723fc985bf2d97d79726c7fd4629824c8556cbc4c4ffaa80bb621093c6a60c5cd2841526f205e41dfe6655c1628311cf5fdff64b197818d99a3c8bcfcbe76b1d947cf7c222e05233c09cfec2ac721dbb6624c0e4f4dfc128d0fe016d81a15546f09f71407843b8b4a9d4ad1283e3e54140cb279d0f0fd46ef1d23408990e1b01a6fb78da6c5bac0a39253d9e00f4b0a369473b09e93f2fd79652f6b3eb10bb44ca30da1138c15d94009792c77cde508c0d79e9d1629839fa4b58deb8d8a55750ea458e7bb999c6cae86e9fc9791d65de6d2e45878ea2b66f7e08cac46749f6a8bdd75427c00f5f6043f6c8147afecde87d139e9213be8bd83f03087eff75f49f2ca1126e1556b9f51cb8f2ece827404fd992cb761e3a1e18fdda6e77eabee63e67a3c20655351958d6629c3684c2c2dd777993e90252de583d66c52f0404b0f5367b706261eb916200716754c44f6e2bf872ebb7886832c933d712bc386fea7bb9d71016872377639a6e5e64dfb10fe857d7b6392c798962ad4487090aaa1e148a5ad0789878c25ecee0cd80c9580f00454802b11b5e5bde6a97efdaa8f9f45877c0fe01faf971134ff4653baeffcc8b5228dd0599a2c66a2b200ddd0e9b7cbcd26f91e56093800f419c12fd4fd582375dfee91f3245ae9086eaf708f88eb584d43119f44f6fad5a7fda969ed4d078e5bbee3f75ed22924bdf48c729388ae1192530ad179e1961106af9ec6447fa5882114ff927c5bccd10335e8248055192278e5d6e47e7473e0798393b537d94a9603b5e4d2d62f2543d63ab3391920855ff106d1d712aec5046572b142df0196577f05a29f7d5ce986a25ac55010a3e3ce05bc1f8aad5104fc9f00bc458d5babc6fd2859bd51621b422c5bb02151aec0de26c7d0eb83f008777c90315f99c2c696de47095f9e0a1526c9b5ab099682465a37d3d0a35a17d822c7b696a8c4cc6a56a7d38a5e2e1bc1242015161e6ed0446bd1ac37945594267603ed83291c0f3dcbd87fa0c90f5350281d175a4bc0b6ae73922d6c9456ade4fd7b5c48907fda9321ecc1f3af3336f3743bd668e71af8025331695ff68474ac692d3721033f78906ee830f020fbfd813bc7939b2c5199f5b42c79fcba2c18c87a57ec317fb657b200f45d3e4eceaadb6ac0062fda2ad743d57378f760d3cb262a8343bcfbe905fe0d312af0f212fb6b49f496faa03a3f4a8922912c83f5e9fb3a5131", 0xdc4}], 0x8, 0x0, 0xe8}, 0x1) [ 785.668511][T19416] loop3: detected capacity change from 0 to 1024 03:45:28 executing program 0: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) [ 785.732950][T19416] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:45:28 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) read(r0, &(0x7f0000000180)=""/223, 0xdf) sendto$unix(r1, &(0x7f0000000040)="ff", 0x1, 0x0, 0x0, 0x0) [ 785.789025][T19416] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated [ 785.814106][T19416] EXT4-fs (loop3): get root inode failed [ 785.823671][T19416] EXT4-fs (loop3): mount failed 03:45:28 executing program 1: r0 = socket(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x200, &(0x7f0000000000), 0x4) 03:45:28 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) stat(&(0x7f00000002c0)='./file0\x00', 0x0) 03:45:28 executing program 2: r0 = socket(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x0, 0x0, 0x0) 03:45:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:28 executing program 0: getgroups(0x3, &(0x7f0000001980)=[0x0, 0xffffffffffffffff, 0x0]) 03:45:28 executing program 5: statfs(&(0x7f0000000080)='.\x00', &(0x7f00000000c0)) 03:45:28 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) 03:45:28 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000002c0), 0x10) [ 786.173351][T19444] loop3: detected capacity change from 0 to 1024 03:45:28 executing program 2: select(0x5, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x5}, &(0x7f0000000100)) [ 786.244903][T19444] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:45:28 executing program 0: r0 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000100)=""/27) 03:45:28 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000001740)={&(0x7f0000000000)=@un=@abs={0x8}, 0x8, &(0x7f0000001400)=[{&(0x7f0000000140)="de32e95b7755b20194a07f1cf44700e6aadf6b4a33a1bd78640b0c6946abd5a1cd047ee179bfacb031d62055d3aee2b16830d1eb9fb764375557f04dbd91ad0198acf1eab0c936018e388751fa54d740b6bfeeea0f5c72cd705fda010e5e238c901680c0c4d8ba7e0d9e31f593ad985e86477b51c9274ff030ec453adb72370d2fc6752cf0fd3c8c5a7997b80205f6e58a08c4b2441f739092dc4d36a4ad76d83d022e42a85ff08742729d01e3a200ddf3f040208fd375287ccc3aa19877a9def60ba2e7a25d6ad9fab55f46151b", 0xce}, {&(0x7f0000000240)="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", 0xf8f}], 0x2, &(0x7f0000001440)=[{0xc}], 0xc}, 0x0) [ 786.334199][T19444] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated [ 786.381048][T19444] EXT4-fs (loop3): get root inode failed [ 786.389462][T19444] EXT4-fs (loop3): mount failed 03:45:29 executing program 2: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) 03:45:29 executing program 5: r0 = shmget$private(0x0, 0x4000, 0x101, &(0x7f0000ff8000/0x4000)=nil) shmat(r0, &(0x7f0000ffb000/0x2000)=nil, 0x6800) 03:45:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqsrc(r0, 0x0, 0x47, 0x0, 0x0) 03:45:29 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0}, 0x5) 03:45:29 executing program 1: shmget(0x1, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) 03:45:29 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xb) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040), &(0x7f00000000c0)=0xb) [ 786.676668][T19477] loop3: detected capacity change from 0 to 1024 03:45:29 executing program 5: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000100)) [ 786.723452][T19477] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:45:29 executing program 4: r0 = socket$inet(0x2, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) [ 786.790169][T19477] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated [ 786.850939][T19477] EXT4-fs (loop3): get root inode failed [ 786.856609][T19477] EXT4-fs (loop3): mount failed 03:45:29 executing program 1: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x3}, 0x1c, &(0x7f0000000680)=[{0x0}, {&(0x7f0000000380)="ce", 0x1}], 0x2}, 0x0) 03:45:29 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) 03:45:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:29 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6_tcp(0x1c, 0x1, 0x0) dup2(r0, r1) 03:45:29 executing program 2: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=@file={0x16}, 0x16) 03:45:29 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) [ 787.154605][T19507] loop3: detected capacity change from 0 to 1024 03:45:29 executing program 0: getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000a80)) 03:45:29 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x16, &(0x7f0000000000)={0x0, 0x4}, 0x8) [ 787.225335][T19507] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 787.294550][T19507] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated [ 787.335955][T19507] EXT4-fs (loop3): get root inode failed [ 787.372867][T19507] EXT4-fs (loop3): mount failed 03:45:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000001740)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, &(0x7f0000001400)=[{&(0x7f0000000140)="de32e95b7755b20194a07f1cf44700e6aadf6b4a33a1bd78640b0c6946abd5a1cd047ee179bfacb031d62055d3aee2b16830d1eb9fb764375557f04dbd91ad0198acf1eab0c936018e388751fa54d740b6bfeeea0f5c72cd705fda010e5e238c901680c0c4d8ba7e0d9e31f593ad985e86477b51c9274ff030ec453adb72370d2fc6752cf0fd3c8c5a7997b80205f6e58a08c4b2441f739092dc4d36a4ad76d83d022e42a85ff08742729d01e3a200ddf3f040208f", 0xb5}, {&(0x7f0000001780)="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", 0xae3}], 0x2}, 0x0) 03:45:30 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000001740)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, &(0x7f0000001400)=[{&(0x7f0000000140)="de32e95b7755b20194a07f1cf44700e6aadf6b4a33a1bd78640b0c6946abd5a1cd047ee179bfacb031d62055d3aee2b16830d1eb9fb764375557f04dbd91ad0198acf1eab0c936018e388751fa54d740b6bfeeea0f5c72cd705fda010e5e238c901680c0c4d8ba7e0d9e31f593ad985e86477b51c9274ff030ec453adb72370d2fc6752cf0fd3c8c5a7997b80205f6e58a08c4b2441f739092dc4d36a4ad76d83d022e42a85ff08742729d01e3a200ddf3f040208f", 0xb5}, {&(0x7f0000001780)="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", 0xb47}], 0x2}, 0x0) 03:45:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:30 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x49, 0x0, 0x0) 03:45:30 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000000080)={0xfffffffffffffd9e}, 0x10) 03:45:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000000)="d2", 0x1) 03:45:30 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) 03:45:30 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f0000000100), &(0x7f0000000140)=0xc) 03:45:30 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000000b80)=@file={0xa}, 0xa) [ 787.704083][T19540] loop3: detected capacity change from 0 to 1024 03:45:30 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000001740)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001140)="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", 0x126}, {&(0x7f0000001780)="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", 0xf37}], 0x2}, 0x0) [ 787.776259][T19540] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 03:45:30 executing program 1: r0 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmctl$IPC_STAT(r0, 0x2, 0x0) 03:45:30 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[@sndinfo={0x1c}, @prinfo={0x14}, @sndinfo={0x1c}, @sndrcv={0x2c}], 0x78}, 0x0) [ 787.859384][T19540] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated 03:45:30 executing program 5: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x3}, 0x1c, &(0x7f0000000680)=[{&(0x7f0000000280)="d5435a48c6fa7e2101c5e6f727d82d87184f9e02dc24977db11b551e8e70d240937de3970eed25c61b52c93c44bb3c160096102b171bf993f89c5f13bc0ed686b53411310a92c92215b9d5627e0d825e9766be8d5e38008e17f7e9c85625c864b90cde830d0dc7f605631013e2a80c578c39af6806a856afdf0c54b328781d366093211c84f31d9a6defefe92446ef619b0667296e14d0377c2b52d898322790fe7f1287a2d7b6a277400a445d2667b3461385fce82ebd2dcc96a14ce71bbb8fa11f", 0xc2}, {&(0x7f0000000380)="ce2c8b0b5038eed52c4c4f55ccd47d2b4e9a4e5c40685f02014823d4e5da227902cd0e54370f97edef9e72c7406eaebe194a7a674023bdcb40f734f43ba0c356a4220201eb9ae8de07bc2794ffa1bbc7f093c1d5f9d0dba746fe2f5cd7c062f4a06b0687ca897fe0b06f235cbb461389827fa8df4ec402446342502049903d1dc95f8effbdcdf4f71962870f8d47b57e535047aa24dadde8e0fa83056a", 0x9d}, {&(0x7f0000000440)="260624cd5c6fd19321e272624a3fdc2322d8695e28ca02bedc18db68bf889fb0da9faad3d4a09582353e2995f304", 0x2e}, {&(0x7f0000000480)="55f6578a8aaecf3a70324cbc78c2115a86968ec1c5d2d1205b74fee1826078d8585bf3ffaf83e429cc95454159e8d6702fe96d8a5405078daf59f8e6d9697425bc27d52e870e162eb4e1774c711f68e6e4dd9a1726979d854c6101991167c7e62c77b622ea55299d4fd53f398e0aa76c1a4a83162a41f60e621e562c20a92a506a668188e77981104e91b3828174a3737fd290abb71043a8021a2bbdea41ccc74a49789f15f5f3c4da8a6397dd355678e5f46f824b168a16c1011d4e1997f74e9990d5fbeec892c6db37cb6ad60daffc74510d911b02b6166812d3a46cff64c5a4b73f227bfe41656176f045e24dca49e8f4bb", 0xf3}, {&(0x7f0000000580)="bdfaf2197179ea9fbaa96d974733e7", 0xf}, {&(0x7f0000001100)="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", 0xd72}], 0x6}, 0x0) [ 787.911100][T19540] EXT4-fs (loop3): get root inode failed [ 787.916921][T19540] EXT4-fs (loop3): mount failed 03:45:30 executing program 0: setitimer(0x0, &(0x7f0000000000)={{0x0, 0xb93}, {0x9}}, 0x0) 03:45:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:30 executing program 1: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000000)={{0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 03:45:30 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) bind$inet(r0, &(0x7f0000000300)={0x5e}, 0x10) 03:45:30 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000380)=[{0x0}], 0x1}, 0x0) 03:45:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000001740)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001140)="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", 0x126}, {&(0x7f0000001780)="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", 0xeae}], 0x2}, 0x0) [ 788.196255][T19573] loop3: detected capacity change from 0 to 1024 03:45:30 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) bind(r0, &(0x7f0000000040)=@un=@abs={0x8}, 0x8) [ 788.249411][T19573] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 03:45:30 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60d6a02400142b00fe8000000000000000000000000000aafe"], 0x0) 03:45:30 executing program 2: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0), 0x4) 03:45:31 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000100)={0x19, 0x2}, 0x10) listen(r0, 0x0) [ 788.379622][T19573] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated [ 788.449638][T19573] EXT4-fs (loop3): get root inode failed [ 788.456371][T19573] EXT4-fs (loop3): mount failed 03:45:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000001740)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001140)="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", 0x128}, {&(0x7f0000001780)="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", 0xe8d}], 0x2}, 0x0) 03:45:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {0x0, 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:31 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000084000000000000007a00c9000100070018000000000000008400000007000000e0000001000080001800000000000000840000000000000075c63cdfff7f0900180000000000000084000000000000007f000700008004001800000000000000840000000500000030"], 0x78}, 0x0) 03:45:31 executing program 0: accept4$unix(0xffffffffffffff9c, 0x0, 0x0, 0x48000000) 03:45:31 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001f40)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='`'], 0x270}, 0x0) 03:45:31 executing program 2: chown(&(0x7f0000000700)='./file0\x00', 0x0, 0xffffffffffffffff) 03:45:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) [ 788.805600][T19608] loop3: detected capacity change from 0 to 1024 03:45:31 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) listen(r0, 0x0) 03:45:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqsrc(r0, 0x0, 0x48, &(0x7f0000000140)={@local={0xac, 0x14, 0x0}, @multicast1, @multicast1}, 0xc) [ 788.870551][T19608] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 03:45:31 executing program 2: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 03:45:31 executing program 1: syz_emit_ethernet(0x36, &(0x7f0000000000)={@remote, @local, @val, {@ipv6}}, 0x0) [ 788.924460][T19608] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated [ 788.950899][T19608] EXT4-fs (loop3): get root inode failed [ 788.959078][T19608] EXT4-fs (loop3): mount failed 03:45:31 executing program 4: socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) 03:45:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {0x0, 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:31 executing program 5: munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) msync(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) 03:45:31 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000180)={0x10}, 0x10) 03:45:31 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000280)={@broadcast, @local, @val, {@arp={0x806, @ether_ipv4}}}, 0x0) 03:45:31 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001300)={0xffffffffffffffff}) getpeername$unix(r0, &(0x7f0000002440), &(0x7f0000001340)=0x1002) [ 789.296823][T19640] loop3: detected capacity change from 0 to 1024 03:45:32 executing program 0: faccessat(0xffffffffffffffff, 0x0, 0x0) 03:45:32 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000003c0)={&(0x7f0000000100), 0x10, &(0x7f0000000340)=[{&(0x7f0000000140)="92", 0x1}], 0x1}, 0x0) [ 789.357664][T19640] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 03:45:32 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) dup2(r0, 0xffffffffffffffff) [ 789.432708][T19640] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated 03:45:32 executing program 1: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x3}, 0x1c, &(0x7f0000000680)=[{&(0x7f0000000280)="d5", 0x1}, {0x0}, {&(0x7f0000000440)='&', 0x1}], 0x3}, 0x0) 03:45:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvfrom$inet(r0, &(0x7f0000000480)=""/85, 0x55, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000540)=""/152, 0x98) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) [ 789.500174][T19640] EXT4-fs (loop3): get root inode failed [ 789.521216][T19640] EXT4-fs (loop3): mount failed 03:45:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000280)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000140)='G', 0x1}], 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB=','], 0x2c}, 0x0) 03:45:32 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001380)={0x0, 0x0, &(0x7f00000011c0)=[{0x0}, {0x0}], 0x2}, 0x0) 03:45:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {0x0, 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:32 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000001740)={&(0x7f0000000080)=@in={0x10, 0x2}, 0x10, &(0x7f0000001400)=[{&(0x7f0000000140)="de32e95b7755b20194a07f1cf44700e6aadf6b4a33a1bd78640b0c6946abd5a1cd047ee179bfacb031d62055d3aee2b16830d1eb9fb764375557f04dbd91ad0198acf1eab0c936018e388751fa54d740b6bfeeea0f5c72cd705fda010e5e238c901680c0c4d8ba7e0d9e31f593ad985e86477b51c9274ff030ec453adb72370d2fc6752cf0fd3c8c5a7997b80205f6e58a08c4b2441f739092dc4d36a4ad76d83d022e42a85ff08742729d01e3a200ddf3f040208f", 0xb5}, {&(0x7f0000001780)="447669a5aea163687e33514e47fc79e02de2300de7b803652e9ca04f9e0dcd0e152daf812a76ac55bbc7a2943b58c0d13ce5e3e6f2616fd186d63ba0179143962208fb90a238618df222c8e7b30e94c0923381486c1cc85e83aa2ad6d6cc1a15f607aac856e634337f288bbff9cb6724e93a8f6fbc78439c7e0d7d5459c24597e7bdabe718c9d94fc80c2a4699aafc9b66f829eea13d6c90ef4599466c640d1af004a4e60db94ce24a7737cf7d1a51d8f69f585042f327d6c34b101e5e57195879110a3abc09594c07effdd82a7da4d9c4ec45cebf7b93d35b28708be7daf07b5689be6cbd706f70775448f31f18449436536b8d11e929ed4b8a78017ebc81374cb6a49e37d8727858005c996a93d2a5b9a810b97464e4a83ea5db2dd18d60f1687b1ceb639083838a44f055bf2274d4cfc8276c1d273276817b129aa6675c1939107f17425443c9113ab2aba680e061e0d6536336287328fbf301354ffa5c83c2faefeacf8d5037055928a65c64b20332cdb77ba8602cfd44632da8af7941bb4ab06c3a97071546708c0a1f9627a078814335009a1a5d7acee50171477f55dc06b12bcbab19a1779d588b441b0d321298d17e6393bdeb23029f4be5b22f8282aae23f0fb479497ec61008a1cb60f0c54964c2d470bd98929458ea52af6b3364c8affba2408debf3ae5c36ceae746b07fb174d97263c7e0ea16de7f68b7d9e8b10871d93dd021a16328565ea388bec48ad79a6a2dbc433ec101003618f501eda6a6ced302c04f6c1f6744a89a3a9ca621faa237bdcebd2f6218c2893569d166514ef57fbe145a3feb023148a44855d67bc20b2dd821c4ef9285750cd76712124d7497b01049991f15c4c424832c8da8a66f207d6a3d3f37ed4a6a8c7b32a72c731e24fe2f154b6e8c5e7f868016f4b7da02d965e9c06d99b1cac2c21b1dabec3817dd3d738fba8509c96cdb580dc40e71087f997e774782522c82e62103623281a429ad44ac8f16b4b8e5e44b11a536cbc3952fc88f815c88c4365626311f7d783f44bda9d4a0c609ebe9f83fcac069a5cf19d9cdfac1eda3847a3a332bc8f5b0b9ffe5b51721fc985d83c6510dd56952b68d85f8704d8de6142a3c34152e46559b8b362ab34d03adb0ee92ddf3329e2c7af3aadabc0d851ea66003264932421ecdd16e1eb4c5b4a4a6a7f47ab9b324db8807d69e40b33ef8829249246c5bcaa1d60beeab5f495a7f984f0ba614817dacde802f065e942cf97377a13d692b9430582de6b6627567dc3c5fb68ea28fe428f584f6c0923ca3864d7829ed05e89848d2045d9b2dfcfead6cf58d3a1923b9e9ad4e00a00ac23a3449dcc1cafdd5f02e1ff72c92538ac7d7e4a6e8bc6c33a56f5d1be423577c536ce79370ebef2d59d1c2974e9049d3e86559663fc8a0489791bb8f5e5f5fbc4db459f30e70351890d4b87bc49b68124bc33c48bbfb165cf272d8a0392193c962169d1bdef94935f01776b788dd9d0839eef6ae46f2332182dc91b8c231f44c76593c66099991397f192c2517b3a96b386ae2134afa7cf9a20393a753d1e695afdb732600bc44a2642d5d6135a6cfe226574ed135d1d320d6a23c3039aaee8e1a6b8fce67f0a7f238146ba182ff55cab3843e2c11dbda0f5d8ee29fdbb57391d780aeb585206018d1231e75430b2ad227a5c7862c6232dc545a440fdc7f501d8f842279dce44c2b713e816d6e5a3919e80f086e6fee48a67c5f5e9d5159c19b78023271221b5398b6b3844b3b096eb608a1dc6e2387d096f75cab28710efde395b3381b714d749c80bf7ee902ee19e4c60721354b1c344399995451fa4be2ea6468462279bf5d48de96ac75e4e5a0aa7e1afc8156e09e7ff1c3bca680085ef990fe154cc48811b099c2215f6296e2ca46524334a5d459fadf3e3305f31285971eccd52c4676b362ba6bf3795c6b03d33e0d5f49771e81bdf52abad369a5f44dc83a818b155b002986722d726afcf7f23bdb4a12ac6b33462eb318167c3efcdae959f431425b0e2c2e1b6040ae807b28367e28a3204ed384e4592ae51383ce59caba3800aa88ce0d8e3a6632bb3bc8ba8d27d32e2fe175c9d84fbeb063bcfe66135b76a9abc909dcd6d47d4553c3cf3977a461f90fc4ab37b1ac487b1bdd46023c4629f65b296068efd950f8b3af0bfc9102b8b5559a612e763dfd7f890da054190fd3f2f048f23461b98070e45dd6aac2591f2eded5e2f2b82ba280a94c52040755be6d6d460de851b45afb46c9ec476eea64550574d0b94255517fbec253208ea05541a4dafceacf87ba07916b34c15a5b1591175cc3a5d5830c3caae02465e9cb193e32b04481c57be243a0f6be2e3cbed8d88d487c82f6283aefb46f396e4b683153ac3d94a26f4ad82fca25aa3535db6d4f3bcf54b02fb1b2b42285262af3b994395f74e147b231ca609bd375e4b1099b7de28db9a4afba7a9fdda9c9e3160cf64b2ed7d3bdde43e131afb987a1fa4177987575d8676bb96448fac765a6ca1669e7196fed7c6ad0218b8636af6db7f3dc46689e05c4c333e93d7813cc9b80b37c85a9a1c5e25d079b6bd9c2278853217e43d138ef6e93c046e1dab5e94eacf4da314a227e99b63c76ed9a18026ab5e3c3d1f53ded0534fcdcdc0a44bd71fa9705e5927a016168c13e546dc8a71927afd5a06de91e868413d9b4538455a929907d8f5064a5a23c81f8f1124b9a9280e64c702ed13036457222625c0ff04f2c520bad609ef916552787ad8697297fb09e9cd738063863e09240db424fbcc9021af7a3c5ef220f1c233b0f1f2658542852f31b47e122e6627d05240680213e2f3294a0d8e2a74016dd2cd59cd59bf5be602fa2a6521e0260f65a6d70ac9460fbee82c9e38391f672cc0a12d965ff9c14e2c99a25ecf4c1c595c5351f54807a27f00476df269b83ff2976946940de59c353d19c671f6bae221bb7ff28c8283ad3d9cb1a0ceb15b6430105aab5a9ef50f30efdda05e56a30460eb782bad02a4ea0efea2f0b55a6ccee95f5907b06314e74a35c5b8003a8779f6640c7620e1cc0190b92d5e9502d80301494ce122a2f180238cf5c6533675dcdef12a24d745f91f83f53a9b63cb981eaa06d693c38475f3990a7111231484b6ba6a7366fe9b7b82015e041b224f107fbaa99e2468701171417bc0f0099950782285fd5ff439c422f418135db9c62e85254b0b62ac4be5dfd081b11e94575ad7851bcd134c633e76defc3cbd03b047d4d491614832ad1da3c693dbe893833c1a825802ca80f80f355b92c290f1724a7039ff6511885394183b37df70498db4b4e79c9543e2323f466b99ef0644acd49e2035d57b8a07a128c5b62409fd542717fb759f0721b40a9775cf60749e351c510778a4dc96a4de2427d3642bd012a6a00d7d37db447a1c1f1f138f5fd45e6057f2ac21a9989866fe1974f740ec8ceb14086f66f740b78dc1cdc7a197ee3dd2d8a44dcacba4fdf0575cc1148e7a341fe8ec77c67ade9ba41e63f76499b13a2b10caa0b04ff16f2ef6805b64e3ac0bb752bd56efd669c202ab791a70c73a63bd1898b19721189e61d386bc1b0170bc2b86a74b70cb61b03dabff8a57bb0e26bdad4ffff43786e45f475fab6fbc218aef51f9e1468644ff3e3f5240cf3adab474fe4d334af530063b94648d4740a31fd972418c40ce139c36874185446e9abd8e2187b5f5629da28d264865c4552824d3e304c60ddf45d0166011f1545c421dbb54d79da336671b7559c30e72bf43ea5275ad5bc999259e465d256f4057948852993776c4cbe82916525c38d901568e408213729eae2b1c46a39bca15c5f248f11c25631bc09536c6beb0aa67ffee914232c41c7978cd48e8fe56ffb1cae8e6020948467f77def283ef5428af65d439b32275d716d031be71beb0adbafae6850fb89b093711795b4326386ee0c4fdaf409c09c2d56e6712bee4c8c1587ecc09dbd68d7ddf3450d6a3d7b5719c7acf93dd7717c266f2d2016660a664c6910c3109a9fb9805aff655717fba1331d8d42a2c97834a923e2ef52830ad78ea0007d2a4febd4ceeec19f97b0608f3a4d9c6f594133d55c942c5dc186b228423c70570f9a775660f408d6274dcf3ecd9e8e07e373eacda67232f7650d1ec869f63328e5a8b74126c51edb9b6829504df8ae4483c3936cdbaa7fd286f81ec4c3f1ead2a2d61b7e8ee29b5cd440c59c0d3131a1960ec91c46a3d74a0cd3b8d111f05350ae249ab68f8101cac6c10d1ba2a81dd8f870f877f21c3f1fa11a202e48884c33491a6ce9680af6998bd8a33a7eda787d19a1728010078c8061c10edd906ce01d088e4e9d38e7a6c576a1ba5dd4fd2b2ecf2c84d54f8becff4f507ce1a0a4eb4fbc812586201f7e6bc0a48739dc383c600ea6f6f72f901ea992ada6b3c9143c4491b6cabdd90c9afecc8795bbc33584c4a2e12318c4f262524781791414452f4c1f388bcec533fcca2c71dc327b39c557d8572f6d0982a6a0bb55e33c643820b009b18b5e080ee2340f807d9737a487369c3ee2c2f57498b4eb7e7b0a16742800d3228c4c834facc2e55fdae1d1630d66d388935fad159eafa914affd062f0878090a574021dae630991801212bf0a2f29bf864b4b0aed084c6edbdce5de1304b6a4196d45abcbb03b5855496de0ef78edbf7b44c296ae8ec4cdbb55d8f46044024c00634c5cc25556c01a57a838b9b5f63b0ecdcbd6b153e34a307e7fde87681d197e2e984416d4bfa89376052ef9ac7c1fd037fce8cab51f39587aefd81a7c2d4d071f8ad4bd9b759270454746659809e5ca2a626826402e5aec2dda7e46dcfbbaa679245e518d85caddde234d765b9ebd8b8e6be3a9b14b5cda4e9bfbdec9ec01d00535ff8e539bb92e4933ce16270abde806a1f97a6a2949ebacb23970dd86a719b76ef53462f7703c0a78a7d73c288398370456966ea92142d697fd9568141a12f1592948aabce618ea6202f04b13f5a211c6efd665e59f95609df60847695f8c40f249325c8938bb1bfa930940666e8d079693fa790fbc9518295d87f950647f84e58136377cca52deda5a0eff438eadb5f97368082e66287a45d985c840c47dba3091bdd0c3f6e62eb8024313190eecb0fedd02dcd35ff34f811d8cff93c4a421d1afc4eee7c50d125f49f1a8a36017211699f62b27b71b6fc017f9335760573ac2e8325d1c47fc74f77b8f79eb841382b9d18760497341d42552c011f9229ea7fafddddcaa9be587b4bad88c228d351c3db0128f57038882a8a4f0016e7355eb00563e511fe5baa9995fb2bd12c199d8a507941a58da0e027e4fca9b992fb03f858b44223835c7e4698a335212ee8710e38a8394", 0xed4}], 0x2}, 0x0) 03:45:32 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000000b80)=@file={0xa}, 0xa) 03:45:32 executing program 0: statfs(&(0x7f0000000080)='.\x00', 0x0) 03:45:32 executing program 1: mkdir(&(0x7f0000000000)='./file1\x00', 0x0) 03:45:32 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x3, &(0x7f0000000780), 0x8) [ 789.922599][T19679] loop3: detected capacity change from 0 to 1024 [ 789.981145][T19679] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 790.028175][T19679] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated 03:45:32 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000000b80)=@file={0xa}, 0xa) r1 = socket$unix(0x1, 0x5, 0x0) connect$unix(r1, &(0x7f0000000bc0)=@file={0xa}, 0xa) [ 790.084670][T19679] EXT4-fs (loop3): get root inode failed [ 790.098348][T19679] EXT4-fs (loop3): mount failed 03:45:32 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000001740)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, &(0x7f0000000080)=[{&(0x7f0000001140)="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", 0x12a}, {&(0x7f0000001780)="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", 0xf33}], 0x2}, 0x0) 03:45:32 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/igmp\x00') read$alg(r0, 0x0, 0x0) 03:45:33 executing program 4: clone(0xfa83b437d92cd191, 0x0, 0x0, 0x0, 0x0) 03:45:33 executing program 1: r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$link(0x8, r0, r1) 03:45:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:33 executing program 2: r0 = socket(0x2, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='cmdline\x00') poll(&(0x7f0000000040)=[{r1, 0x4}, {r0}], 0x2, 0x0) 03:45:33 executing program 5: r0 = socket(0x2, 0x1, 0x0) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4080) 03:45:33 executing program 0: getrusage(0x0, &(0x7f0000000440)) [ 790.715623][T19716] loop3: detected capacity change from 0 to 1024 03:45:33 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_mr_vif\x00') read$alg(r0, 0x0, 0x0) 03:45:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='setgroups\x00') r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup2(r1, r0) [ 790.773683][T19716] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 03:45:33 executing program 1: setitimer(0x0, &(0x7f0000000040)={{}, {0x0, 0x2710}}, &(0x7f0000000080)) 03:45:33 executing program 2: msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) msgget(0x3, 0x648) msgctl$IPC_RMID(0x0, 0x0) prctl$PR_SET_FPEXC(0xc, 0x3) [ 790.832821][T19716] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated [ 790.918158][T19716] EXT4-fs (loop3): get root inode failed 03:45:33 executing program 4: syz_emit_ethernet(0xfd03, &(0x7f0000000000)={@dev={'\xaa\xaa\xaa\xaa\xaa', 0xb}, @local, @val, {@x25={0x805, {0x0, 0x0, 0x0, "17d811896a552f65758324487b98615d4e9f48e26c01ed7e929af6991d03fab8b178f3780b105a21747326010a89f6197767ecdf240f73ae93b81f7a0ae69f00ada90f9cec4b1cb88e916035f6f32e09d091d56629d9a9af690bb2dc5a735a887732c745640f44688fe76928b3df23614f809cbe8d38f4aedb070718683291cc"}}}}, 0x0) [ 790.972679][T19716] EXT4-fs (loop3): mount failed 03:45:33 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000010c0)='net/netlink\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 03:45:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='setgroups\x00') r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup2(r1, r0) 03:45:33 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ptype\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/188, 0xbc}], 0x1, 0x81378, 0x0) 03:45:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:33 executing program 2: msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) msgget(0x3, 0x648) msgctl$IPC_RMID(0x0, 0x0) prctl$PR_SET_FPEXC(0xc, 0x3) 03:45:33 executing program 4: setuid(0x0) personality(0x8000000) r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = geteuid() r2 = getegid() r3 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r0) request_key(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000180)='}\x00', r3) keyctl$link(0x8, r0, r0) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$getown(r4, 0x9) ioctl$BTRFS_IOC_SPACE_INFO(r4, 0xc0109414, &(0x7f0000000240)={0xe6e, 0x0, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="570000007d010000003e000700010000008000000000030000000000000000001004ff213e627f0000003f00000000000000000003005c5e5d000008006b657972696e67000400253a7d23", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=0xee00], 0x57) 03:45:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='setgroups\x00') r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup2(r1, r0) 03:45:33 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000001080)='net/fib_triestat\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/4080, 0xff0}], 0x1, 0xffffffff, 0x0) [ 791.327397][T19751] loop3: detected capacity change from 0 to 1024 03:45:34 executing program 2: msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) msgget(0x3, 0x648) msgctl$IPC_RMID(0x0, 0x0) prctl$PR_SET_FPEXC(0xc, 0x3) [ 791.387727][T19751] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 03:45:34 executing program 0: clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) futex(&(0x7f00000000c0)=0x1, 0x86, 0x0, &(0x7f0000000040)={r0, r1+10000000}, 0x0, 0x0) [ 791.460931][T19751] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated [ 791.477703][T19751] EXT4-fs (loop3): get root inode failed [ 791.486445][T19751] EXT4-fs (loop3): mount failed 03:45:34 executing program 4: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r0, &(0x7f0000000000)={0x7}, 0xfffffffffffffd1b) 03:45:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='setgroups\x00') r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup2(r1, r0) 03:45:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x6, 0x6, 0x201}, 0x14}}, 0x0) 03:45:34 executing program 0: fork() wait4(0x0, 0x0, 0x80000000, 0x0) 03:45:34 executing program 2: msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) msgget(0x3, 0x648) msgctl$IPC_RMID(0x0, 0x0) prctl$PR_SET_FPEXC(0xc, 0x3) 03:45:34 executing program 1: r0 = fork() sched_rr_get_interval(r0, &(0x7f00000000c0)) [ 791.736171][T19775] loop3: detected capacity change from 0 to 1024 [ 791.767177][T19775] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 03:45:34 executing program 4: clock_nanosleep(0x2, 0x0, &(0x7f0000001040)={0x0, 0x989680}, 0x0) fork() [ 791.823745][T19775] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated [ 791.860309][T19775] EXT4-fs (loop3): get root inode failed [ 791.868849][T19775] EXT4-fs (loop3): mount failed 03:45:34 executing program 5: syz_emit_ethernet(0x46, &(0x7f00000000c0)={@random="2f0e64259086", @local, @val={@void, {0x8100, 0x7}}, {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @local, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @empty, @mcast1}}}}, 0x0) 03:45:34 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x2, &(0x7f0000000080)=[{0x5}, {0x6}]}) 03:45:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="0300000004", 0x5, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='projid_map\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/188, 0xbc}], 0x1, 0x81378, 0x0) 03:45:34 executing program 0: r0 = mq_open(&(0x7f0000000000)='{}\x00', 0x0, 0x0, 0x0) mq_timedreceive(r0, &(0x7f0000000080)=""/16, 0x10, 0x0, 0x0) 03:45:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 792.151498][T19802] loop3: detected capacity change from 0 to 1024 [ 792.204329][T19802] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) 03:45:34 executing program 1: r0 = timerfd_create(0x0, 0x0) poll(&(0x7f0000003700)=[{r0}], 0x1, 0x0) 03:45:34 executing program 0: r0 = mq_open(&(0x7f0000000000)='{}\x00', 0x0, 0x0, 0x0) mq_timedreceive(r0, &(0x7f0000000080)=""/16, 0x10, 0x0, 0x0) [ 792.265010][T19802] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated [ 792.288514][T19802] EXT4-fs (loop3): get root inode failed [ 792.294411][T19802] EXT4-fs (loop3): mount failed [ 792.355768][ T26] audit: type=1326 audit(1630727134.966:27): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19800 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x0 03:45:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="0300000004", 0x5, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:35 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='loginuid\x00') read$alg(r0, 0x0, 0x0) 03:45:35 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') 03:45:35 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/1, 0x1}], 0x1, 0x4, 0x0) 03:45:35 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001080)='net/raw6\x00') preadv(r0, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 03:45:35 executing program 0: r0 = mq_open(&(0x7f0000000000)='{}\x00', 0x0, 0x0, 0x0) mq_timedreceive(r0, &(0x7f0000000080)=""/16, 0x10, 0x0, 0x0) [ 792.652488][T19826] loop3: detected capacity change from 0 to 1024 03:45:35 executing program 4: prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x26) 03:45:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/sockcreate\x00') read$alg(r0, 0x0, 0x0) [ 792.761150][T19826] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) 03:45:35 executing program 2: fchownat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) 03:45:35 executing program 0: r0 = mq_open(&(0x7f0000000000)='{}\x00', 0x0, 0x0, 0x0) mq_timedreceive(r0, &(0x7f0000000080)=""/16, 0x10, 0x0, 0x0) [ 792.844986][T19826] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated 03:45:35 executing program 1: syz_emit_ethernet(0x92, &(0x7f0000000000)={@empty, @link_local, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "61e827", 0x5c, 0x2f, 0x0, @empty, @private0, {[@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@private1]}]}}}}}, 0x0) [ 792.923047][T19826] EXT4-fs (loop3): get root inode failed [ 792.939382][T19826] EXT4-fs (loop3): mount failed 03:45:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/197, 0xc5}], 0x1, 0x85378, 0x0) 03:45:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="0300000004", 0x5, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:35 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_tables_names\x00') preadv(r0, &(0x7f0000001280)=[{&(0x7f0000000080)=""/4096, 0x1000}], 0x1, 0x0, 0x0) 03:45:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat\x00') read$alg(r0, 0x0, 0x0) 03:45:35 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_GET(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000600)={0x14, 0x0, 0x4}, 0x14}}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000200), r0) 03:45:35 executing program 0: mq_open(&(0x7f0000000080)='.+\x00', 0x0, 0x0, 0x0) 03:45:35 executing program 2: openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x410202, 0x0) 03:45:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup2(r1, r0) 03:45:36 executing program 1: r0 = fork() migrate_pages(r0, 0x2, 0x0, &(0x7f0000000240)=0x61) [ 793.315628][T19861] loop3: detected capacity change from 0 to 1024 03:45:36 executing program 4: preadv(0xffffffffffffffff, 0x0, 0x2388e4d1acf9204d, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) gettid() sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x20000800}, 0x4004011) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, 0x0) r0 = openat$apparmor_thread_current(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) wait4(0x0, 0x0, 0x2, &(0x7f0000000100)) write$apparmor_current(r0, 0x0, 0x22) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='changehat 0'], 0x1d) 03:45:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/softnet_stat\x00') preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)=""/153, 0x99}], 0x1, 0x3, 0x0) [ 793.382389][T19861] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) [ 793.443336][T19861] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated 03:45:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/icmp6\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000100)=""/188, 0xbc}], 0x1, 0x1378, 0x0) [ 793.505067][T19861] EXT4-fs (loop3): get root inode failed [ 793.513443][T19861] EXT4-fs (loop3): mount failed 03:45:36 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') read$alg(r0, 0x0, 0x0) 03:45:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000", 0x7, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:36 executing program 4: preadv(0xffffffffffffffff, 0x0, 0x2388e4d1acf9204d, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) gettid() sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x20000800}, 0x4004011) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, 0x0) r0 = openat$apparmor_thread_current(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) wait4(0x0, 0x0, 0x2, &(0x7f0000000100)) write$apparmor_current(r0, 0x0, 0x22) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='changehat 0'], 0x1d) 03:45:36 executing program 1: r0 = fork() migrate_pages(r0, 0x2, 0x0, &(0x7f0000000240)=0x61) 03:45:36 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x410202, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f00000000c0), 0x2, 0x0) 03:45:36 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x1d, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3}, 0x40) 03:45:36 executing program 5: socket(0x10, 0x3, 0x7fffffff) [ 793.540518][T19870] AppArmor: change_hat: Invalid input '0' [ 793.875352][T19893] AppArmor: change_hat: Invalid input '0' [ 793.891264][T19897] loop3: detected capacity change from 0 to 1024 03:45:36 executing program 4: preadv(0xffffffffffffffff, 0x0, 0x2388e4d1acf9204d, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) gettid() sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x20000800}, 0x4004011) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, 0x0) r0 = openat$apparmor_thread_current(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) wait4(0x0, 0x0, 0x2, &(0x7f0000000100)) write$apparmor_current(r0, 0x0, 0x22) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='changehat 0'], 0x1d) [ 793.957364][T19897] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) 03:45:36 executing program 1: r0 = fork() migrate_pages(r0, 0x2, 0x0, &(0x7f0000000240)=0x61) 03:45:36 executing program 0: r0 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x6, r0, 0x0) [ 794.013083][T19897] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated 03:45:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000000)=0x1, 0x4) [ 794.068334][T19897] EXT4-fs (loop3): get root inode failed [ 794.106456][T19897] EXT4-fs (loop3): mount failed 03:45:36 executing program 5: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xc000, 0x1) 03:45:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000", 0x7, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:36 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400", 0x1c, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:36 executing program 4: preadv(0xffffffffffffffff, 0x0, 0x2388e4d1acf9204d, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) gettid() sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x20000800}, 0x4004011) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, 0x0) r0 = openat$apparmor_thread_current(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) wait4(0x0, 0x0, 0x2, &(0x7f0000000100)) write$apparmor_current(r0, 0x0, 0x22) write$apparmor_current(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='changehat 0'], 0x1d) 03:45:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf465", 0xf, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:37 executing program 1: r0 = fork() migrate_pages(r0, 0x2, 0x0, &(0x7f0000000240)=0x61) 03:45:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6}], 0x81, &(0x7f00000000c0)) [ 794.176326][T19910] AppArmor: change_hat: Invalid input '0' [ 794.422020][T19925] loop3: detected capacity change from 0 to 1024 [ 794.446662][T19926] loop0: detected capacity change from 0 to 1024 [ 794.499335][T19930] AppArmor: change_hat: Invalid input '0' [ 794.513178][T19925] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) [ 794.529922][T19936] loop2: detected capacity change from 0 to 1024 [ 794.558428][T19926] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:45:37 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000000c0)) [ 794.600985][T19936] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 794.632617][T19926] EXT4-fs (loop0): corrupt root inode, run e2fsck [ 794.642271][T19925] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated [ 794.661134][T19925] EXT4-fs (loop3): get root inode failed [ 794.666300][T19926] EXT4-fs (loop0): mount failed [ 794.667327][T19925] EXT4-fs (loop3): mount failed [ 794.701950][T19945] loop5: detected capacity change from 0 to 1024 [ 794.728109][T19936] EXT4-fs error (device loop2): ext4_fill_super:4810: inode #2: comm syz-executor.2: iget: root inode unallocated [ 794.789365][T19950] loop4: detected capacity change from 0 to 1024 03:45:37 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f00000000c0)) [ 794.839986][T19936] EXT4-fs (loop2): get root inode failed [ 794.852178][T19945] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 794.882091][T19936] EXT4-fs (loop2): mount failed 03:45:37 executing program 1: mkdir(&(0x7f0000000f80)='./file1\x00', 0x0) syz_mount_image$v7(&(0x7f0000000fc0), &(0x7f0000001000)='./file1/../file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{0x0, 0x0, 0x9b2f}, {0x0}], 0x0, &(0x7f0000001380)={[], [{@context={'context', 0x3d, 'unconfined_u'}}]}) 03:45:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000", 0x7, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 794.907545][T19950] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 794.948742][T19945] EXT4-fs (loop5): orphan cleanup on readonly fs [ 794.998718][T19945] EXT4-fs error (device loop5): ext4_quota_enable:6306: comm syz-executor.5: Bad quota inode # 3 [ 795.005381][T19964] loop0: detected capacity change from 0 to 1024 [ 795.019969][T19950] EXT4-fs (loop4): orphan cleanup on readonly fs [ 795.038874][T19945] EXT4-fs warning (device loop5): ext4_enable_quotas:6343: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 795.046552][T19964] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 795.056320][T19945] EXT4-fs (loop5): Cannot turn on quotas: error -116 [ 795.072333][T19945] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 795.090484][T19950] EXT4-fs error (device loop4): ext4_quota_enable:6306: comm syz-executor.4: Bad quota inode # 3 [ 795.101271][T19950] EXT4-fs warning (device loop4): ext4_enable_quotas:6343: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 795.115735][T19950] EXT4-fs (loop4): Cannot turn on quotas: error -116 [ 795.123880][T19950] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:45:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 795.161980][T19964] EXT4-fs (loop0): orphan cleanup on readonly fs [ 795.175042][T19964] EXT4-fs error (device loop0): ext4_quota_enable:6306: comm syz-executor.0: Bad quota inode # 3 [ 795.190453][T19964] EXT4-fs warning (device loop0): ext4_enable_quotas:6343: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 795.205693][T19964] EXT4-fs (loop0): Cannot turn on quotas: error -116 [ 795.213172][T19964] EXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:45:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:45:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 795.317592][T19970] loop1: detected capacity change from 0 to 155 [ 795.342097][T19975] loop3: detected capacity change from 0 to 1024 03:45:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 795.375740][T19970] VFS: could not find a valid V7 on loop1. [ 795.400986][T19975] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) [ 795.465322][T19975] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated [ 795.492462][T19975] EXT4-fs (loop3): get root inode failed [ 795.507911][T19975] EXT4-fs (loop3): mount failed 03:45:38 executing program 1: mkdir(&(0x7f0000000f80)='./file1\x00', 0x0) syz_mount_image$v7(&(0x7f0000000fc0), &(0x7f0000001000)='./file1/../file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{0x0, 0x0, 0x9b2f}, {0x0}], 0x0, &(0x7f0000001380)={[], [{@context={'context', 0x3d, 'unconfined_u'}}]}) [ 795.566573][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 795.650254][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:45:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 795.716426][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:45:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 795.785056][T19998] loop1: detected capacity change from 0 to 155 [ 795.820595][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 795.868757][T20000] loop3: detected capacity change from 0 to 1024 [ 795.882032][T19998] VFS: could not find a valid V7 on loop1. [ 795.960038][T20000] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) 03:45:38 executing program 1: mkdir(&(0x7f0000000f80)='./file1\x00', 0x0) syz_mount_image$v7(&(0x7f0000000fc0), &(0x7f0000001000)='./file1/../file0\x00', 0x0, 0x2, &(0x7f0000001300)=[{0x0, 0x0, 0x9b2f}, {0x0}], 0x0, &(0x7f0000001380)={[], [{@context={'context', 0x3d, 'unconfined_u'}}]}) [ 796.009374][T20000] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated [ 796.070430][T20000] EXT4-fs (loop3): get root inode failed [ 796.093902][T20000] EXT4-fs (loop3): mount failed [ 796.148578][T20012] loop1: detected capacity change from 0 to 155 [ 796.175265][T20012] VFS: could not find a valid V7 on loop1. 03:45:38 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) syz_emit_ethernet(0x45, &(0x7f0000000000)={@link_local, @broadcast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x37, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x3f18, {0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, "00006371ae9b1c"}}}}}, 0x0) 03:45:38 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 796.187064][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:45:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp, 0x0, 0x1, 0x42821539, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:45:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:45:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp, 0x0, 0x1, 0x42821539, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 796.454545][T20028] loop3: detected capacity change from 0 to 1024 [ 796.483067][T20028] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) [ 796.508996][T20028] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated [ 796.524186][T20028] EXT4-fs (loop3): get root inode failed [ 796.530829][T20028] EXT4-fs (loop3): mount failed [ 796.626008][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:45:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 796.804987][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 797.089732][T20045] loop3: detected capacity change from 0 to 1024 [ 797.146543][T20045] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) [ 797.185050][T20045] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated [ 797.209216][T20045] EXT4-fs (loop3): get root inode failed [ 797.216406][T20045] EXT4-fs (loop3): mount failed 03:45:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:40 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) syz_emit_ethernet(0x46, &(0x7f0000000000)={@link_local, @broadcast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x3f18, {0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, "00006371ae9b1c03"}}}}}, 0x0) [ 797.509367][T20052] loop3: detected capacity change from 0 to 1024 [ 797.550038][T20052] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 03:45:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 797.606646][T20052] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated [ 797.664594][T20052] EXT4-fs (loop3): get root inode failed [ 797.697921][T20052] EXT4-fs (loop3): mount failed [ 797.698621][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 798.685255][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 798.803398][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:45:43 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:45:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) syz_emit_ethernet(0x46, &(0x7f0000000000)={@link_local, @broadcast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x3, 0x0, 0x3f18, {0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, "00006371ae9b1c03"}}}}}, 0x0) [ 800.672556][T20081] loop3: detected capacity change from 0 to 1024 [ 800.723443][T20081] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 800.744753][T20081] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated [ 800.762247][T20081] EXT4-fs (loop3): get root inode failed [ 800.775103][T20081] EXT4-fs (loop3): mount failed 03:45:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:45:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp, 0x0, 0x1, 0x42821539, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:45:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 801.293094][T20093] loop3: detected capacity change from 0 to 1024 [ 801.377428][T20093] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 801.445651][T20093] EXT4-fs error (device loop3): ext4_fill_super:4810: inode #2: comm syz-executor.3: iget: root inode unallocated [ 801.510300][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 801.604771][T20093] EXT4-fs (loop3): get root inode failed [ 801.667189][T20093] EXT4-fs (loop3): mount failed 03:45:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp, 0x0, 0x1, 0x42821539, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:45:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:45:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:45 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:45:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 802.542072][T20107] loop3: detected capacity change from 0 to 1024 [ 802.582187][T20107] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 802.625289][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 802.645488][T20107] EXT4-fs (loop3): orphan cleanup on readonly fs [ 802.656217][T20107] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 33554432 03:45:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 802.668847][T20107] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 802.923088][T20121] loop3: detected capacity change from 0 to 1024 [ 802.993161][T20121] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 803.027943][T20121] EXT4-fs (loop3): orphan cleanup on readonly fs [ 803.041481][T20121] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 33554432 [ 803.078669][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 803.192193][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 803.206765][T20121] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:45:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 803.935762][T20128] loop3: detected capacity change from 0 to 1024 [ 804.041650][T20128] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:45:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 804.284629][T20128] EXT4-fs (loop3): orphan cleanup on readonly fs [ 804.292511][T20128] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 33554432 [ 804.330366][T20128] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:45:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 804.842399][T20139] loop3: detected capacity change from 0 to 1024 [ 804.913746][T20139] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 804.994852][T20139] EXT4-fs (loop3): orphan cleanup on readonly fs [ 805.025695][T20139] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 33554432 [ 805.119743][T20139] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:45:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 805.351579][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:45:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp, 0x0, 0x1, 0x42821539, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 805.480860][T20147] loop3: detected capacity change from 0 to 1024 [ 805.515055][T20147] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:45:48 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 805.609262][T20147] EXT4-fs (loop3): orphan cleanup on readonly fs [ 805.627384][T20147] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 33554432 [ 805.683430][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 805.776287][T20147] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 805.926025][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 808.268805][ T1359] ieee802154 phy0 wpan0: encryption failed: -22 [ 808.275592][ T1359] ieee802154 phy1 wpan1: encryption failed: -22 03:45:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp, 0x0, 0x1, 0x42821539, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:45:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:45:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp, 0x0, 0x1, 0x42821539, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:45:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:45:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 809.741274][T20171] loop3: detected capacity change from 0 to 1024 [ 809.776200][T20171] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 809.819336][T20171] EXT4-fs (loop3): orphan cleanup on readonly fs [ 809.822705][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 809.825690][T20171] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 33554432 [ 809.825990][T20171] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 809.887752][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:45:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040), 0x0, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 809.964114][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 810.008370][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 810.414259][T20187] loop3: detected capacity change from 0 to 1024 [ 810.636155][T20187] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 810.678689][T20187] EXT4-fs (loop3): orphan cleanup on readonly fs [ 810.759537][T20187] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 33554432 [ 810.805915][T20187] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:45:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040), 0x0, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 811.118314][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 811.246611][T20195] loop3: detected capacity change from 0 to 1024 [ 811.281751][T20195] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 811.342932][T20195] EXT4-fs (loop3): orphan cleanup on readonly fs [ 811.354227][T20195] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 33554432 [ 811.415274][T20195] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:45:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040), 0x0, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 811.741839][T20202] loop3: detected capacity change from 0 to 1024 [ 811.775833][T20202] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 811.805562][T20202] EXT4-fs (loop3): orphan cleanup on readonly fs [ 812.022497][T20202] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 33554432 [ 812.095228][T20202] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:45:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 812.742765][T20210] loop3: detected capacity change from 0 to 1024 [ 812.768243][T20210] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 812.803890][T20210] EXT4-fs (loop3): orphan cleanup on readonly fs [ 812.872631][T20210] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 33554432 [ 812.946316][T20210] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:45:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 813.246268][T20218] loop3: detected capacity change from 0 to 1024 [ 813.336521][T20218] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 813.384338][T20218] EXT4-fs (loop3): orphan cleanup on readonly fs 03:45:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040), 0x0, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 813.434976][T20218] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 33554432 [ 813.456218][T20218] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 813.580702][T20223] loop5: detected capacity change from 0 to 1024 [ 813.631350][T20223] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 813.671066][T20223] EXT4-fs (loop5): orphan cleanup on readonly fs 03:45:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:45:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:45:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp, 0x0, 0x1, 0x42821539, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 813.704954][T20223] EXT4-fs error (device loop5): ext4_orphan_get:1419: comm syz-executor.5: bad orphan inode 33554432 03:45:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 813.748171][T20223] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 813.798899][T20233] loop3: detected capacity change from 0 to 1024 [ 813.820840][T20233] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 813.875266][T20233] EXT4-fs (loop3): orphan cleanup on readonly fs 03:45:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:45:56 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp, 0x0, 0x1, 0x42821539, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 813.924221][T20233] EXT4-fs error (device loop3): ext4_orphan_get:1419: comm syz-executor.3: bad orphan inode 33554432 [ 813.999096][T20233] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 03:45:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 814.127620][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 814.167651][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 814.197134][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 814.362998][T20256] loop3: detected capacity change from 0 to 1024 [ 814.387866][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 814.414735][T20256] EXT4-fs (loop3): unsupported descriptor size 0 03:45:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 814.978915][T20264] loop3: detected capacity change from 0 to 1024 [ 815.056687][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 815.171179][T20264] EXT4-fs (loop3): unsupported descriptor size 0 03:45:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 815.761951][T20272] loop3: detected capacity change from 0 to 1024 [ 815.901400][T20272] EXT4-fs (loop3): unsupported descriptor size 0 03:45:58 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 816.270262][T20280] loop3: detected capacity change from 0 to 1024 [ 816.359977][T20280] EXT4-fs (loop3): unsupported descriptor size 0 03:45:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 816.732749][T20286] loop3: detected capacity change from 0 to 1024 [ 816.788750][T20286] EXT4-fs (loop3): unsupported descriptor size 0 03:45:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:45:59 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp, 0x0, 0x1, 0x42821539, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:45:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:45:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 817.132730][T20300] loop3: detected capacity change from 0 to 1024 [ 817.148721][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 817.168908][T20300] EXT4-fs (loop3): unsupported descriptor size 0 [ 817.196516][T20304] loop2: detected capacity change from 0 to 1024 [ 817.245723][T20304] EXT4-fs (loop2): unsupported descriptor size 0 [ 817.351824][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:46:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp, 0x0, 0x1, 0x42821539, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 818.476344][T20320] loop3: detected capacity change from 0 to 1024 [ 818.481482][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 818.526883][T20320] EXT4-fs (loop3): unsupported descriptor size 0 [ 818.563534][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp, 0x0, 0x1, 0x42821539, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 818.687828][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp, 0x0, 0x1, 0x42821539, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 818.915705][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 819.135195][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 819.185770][T20340] loop3: detected capacity change from 0 to 1024 [ 819.466372][T20340] EXT4-fs (loop3): unsupported descriptor size 0 03:46:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 820.137344][T20346] loop3: detected capacity change from 0 to 1024 [ 820.173484][T20346] EXT4-fs (loop3): unsupported descriptor size 0 03:46:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 820.312107][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a", 0x10, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 820.720353][T20355] loop3: detected capacity change from 0 to 1024 [ 820.786430][T20355] EXT4-fs (loop3): unsupported descriptor size 0 03:46:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a", 0x10, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 821.025255][T20360] loop3: detected capacity change from 0 to 1024 [ 821.054896][T20360] EXT4-fs (loop3): unsupported descriptor size 0 03:46:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a", 0x10, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 821.306161][T20369] loop3: detected capacity change from 0 to 1024 [ 821.351059][T20369] EXT4-fs (loop3): unsupported descriptor size 0 03:46:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c89", 0x18, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 821.648052][T20377] loop3: detected capacity change from 0 to 1024 [ 821.676862][T20377] EXT4-fs (loop3): unsupported descriptor size 0 [ 821.736889][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c89", 0x18, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:46:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 821.891783][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 821.934548][T20393] loop3: detected capacity change from 0 to 1024 [ 821.940033][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 821.991804][T20393] EXT4-fs (loop3): unsupported descriptor size 0 [ 822.114629][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c89", 0x18, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 822.598453][T20405] loop3: detected capacity change from 0 to 1024 [ 822.626362][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 822.661744][T20405] EXT4-fs (loop3): unsupported descriptor size 0 03:46:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045", 0x1c, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:46:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp, 0x0, 0x1, 0x42821539, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 822.853622][T20414] loop3: detected capacity change from 0 to 1024 [ 822.881341][T20414] EXT4-fs (loop3): unsupported descriptor size 0 03:46:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045", 0x1c, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:46:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 823.189360][T20431] loop3: detected capacity change from 0 to 1024 [ 823.211182][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 823.242227][T20431] EXT4-fs (loop3): unsupported descriptor size 0 [ 823.243886][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 823.291448][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp, 0x0, 0x1, 0x42821539, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045", 0x1c, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:46:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 823.543220][T20441] loop3: detected capacity change from 0 to 1024 [ 823.587075][T20441] EXT4-fs (loop3): unsupported descriptor size 0 03:46:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f2800450100", 0x1e, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 824.053547][T20453] loop3: detected capacity change from 0 to 1024 [ 824.113106][T20453] EXT4-fs (loop3): unsupported descriptor size 0 03:46:06 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f2800450100", 0x1e, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 824.592573][T20460] loop3: detected capacity change from 0 to 1024 [ 824.700443][T20460] EXT4-fs (loop3): unsupported descriptor size 0 [ 824.809190][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:07 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f2800450100", 0x1e, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 825.453521][T20466] loop3: detected capacity change from 0 to 1024 [ 825.619296][T20466] EXT4-fs (loop3): unsupported descriptor size 0 03:46:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 826.024660][T20473] loop3: detected capacity change from 0 to 1024 [ 826.075224][T20473] EXT4-fs (loop3): unsupported descriptor size 0 03:46:08 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 826.419382][T20480] loop3: detected capacity change from 0 to 1024 [ 826.471000][T20480] EXT4-fs (loop3): unsupported descriptor size 0 03:46:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:46:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 827.825603][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 827.854100][T20493] loop3: detected capacity change from 0 to 1024 [ 827.910460][T20493] EXT4-fs (loop3): unsupported descriptor size 0 [ 828.078232][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 828.118366][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:14 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:46:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:14 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp, 0x0, 0x1, 0x42821539, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 831.813941][T20513] loop3: detected capacity change from 0 to 1024 [ 831.857106][T20513] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 831.894734][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 831.904942][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 831.983818][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 832.045444][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 832.522372][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 832.646630][T20528] loop3: detected capacity change from 0 to 1024 [ 832.682758][T20528] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 03:46:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 832.867281][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 832.975804][T20537] loop3: detected capacity change from 0 to 1024 [ 833.028672][T20537] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 03:46:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 833.240359][T20544] loop3: detected capacity change from 0 to 1024 [ 833.302359][T20544] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 03:46:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:46:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 834.019075][T20553] loop3: detected capacity change from 0 to 1024 [ 834.042481][T20553] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 03:46:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 834.217560][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 834.442028][T20561] loop3: detected capacity change from 0 to 1024 [ 834.555980][T20561] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 03:46:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp, 0x0, 0x1, 0x42821539, 0x0, 0x0, 0xffff}, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:46:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 834.997522][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 835.025398][T20576] loop3: detected capacity change from 0 to 1024 [ 835.046328][T20576] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 835.075205][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 835.740335][T20589] loop3: detected capacity change from 0 to 1024 [ 835.800409][T20589] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 03:46:18 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 836.215957][T20596] loop3: detected capacity change from 0 to 1024 [ 836.306746][T20596] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 03:46:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 836.545906][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp, 0x0, 0x1, 0x42821539, 0x0, 0x0, 0xffff}, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 836.616959][T20605] loop3: detected capacity change from 0 to 1024 [ 836.697597][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 836.780189][T20605] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 837.107752][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:46:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 839.281394][T20619] loop3: detected capacity change from 0 to 1024 [ 839.345061][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 839.364353][T20619] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 839.462800][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 839.769049][T20635] loop3: detected capacity change from 0 to 1024 [ 839.859644][T20635] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 03:46:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 840.172965][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 840.175065][T20642] loop3: detected capacity change from 0 to 1024 03:46:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 840.284638][T20642] EXT4-fs (loop3): invalid first ino: 0 [ 840.309586][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 840.946783][T20652] loop3: detected capacity change from 0 to 1024 [ 841.104910][T20652] EXT4-fs (loop3): invalid first ino: 0 03:46:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 841.899499][T20659] loop3: detected capacity change from 0 to 1024 [ 841.931853][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 841.981419][T20659] EXT4-fs (loop3): invalid first ino: 0 03:46:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 842.275734][T20669] loop3: detected capacity change from 0 to 1024 [ 842.327601][T20669] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 842.540920][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:46:25 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 843.444747][T20681] loop3: detected capacity change from 0 to 1024 [ 843.477047][T20681] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 03:46:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 843.686961][T20696] loop3: detected capacity change from 0 to 1024 [ 843.687739][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 843.722612][T20696] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 843.730526][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 843.764343][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 844.171853][T20704] loop3: detected capacity change from 0 to 1024 [ 844.212226][T20704] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 03:46:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 844.563519][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 844.600826][T20711] loop3: detected capacity change from 0 to 1024 [ 844.664996][T20711] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 03:46:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 845.141778][T20718] loop3: detected capacity change from 0 to 1024 [ 845.261733][T20718] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 03:46:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 845.946437][T20725] loop3: detected capacity change from 0 to 1024 [ 846.027691][T20725] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 03:46:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 846.601329][T20732] loop3: detected capacity change from 0 to 1024 [ 846.691142][T20732] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 03:46:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:46:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 848.166514][T20746] loop3: detected capacity change from 0 to 1024 [ 848.221629][T20746] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) [ 848.260233][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 848.332935][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 848.383328][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 848.453759][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 848.566419][T20759] loop3: detected capacity change from 0 to 1024 [ 848.643447][T20759] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 03:46:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 849.106303][T20767] loop3: detected capacity change from 0 to 1024 03:46:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 849.157512][T20767] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 03:46:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 849.416067][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 849.751851][T20776] loop3: detected capacity change from 0 to 1024 [ 849.862350][T20776] EXT4-fs (loop3): fragment/cluster size (16384) != block size (1024) 03:46:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 850.085059][T20783] loop3: detected capacity change from 0 to 1024 [ 850.127784][T20783] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 03:46:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) 03:46:32 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 850.319509][T20790] loop3: detected capacity change from 0 to 1024 [ 850.370585][T20790] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 850.444397][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp, 0x0, 0x1, 0x42821539, 0x0, 0x0, 0xffff}, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, &(0x7f00000000c0)) [ 850.563029][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 850.639758][T20805] loop3: detected capacity change from 0 to 1024 [ 850.686231][T20805] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 850.897509][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x0, &(0x7f00000000c0)) [ 851.246974][T20819] loop3: detected capacity change from 0 to 1024 [ 851.408816][T20819] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 851.458971][T20819] EXT4-fs (loop3): group descriptors corrupted! [ 851.476729][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x0, &(0x7f00000000c0)) [ 851.900230][T20828] loop3: detected capacity change from 0 to 1024 03:46:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 851.941461][T20828] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 851.959496][T20828] EXT4-fs (loop3): group descriptors corrupted! 03:46:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x0, &(0x7f00000000c0)) [ 852.037843][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 852.192883][T20837] loop3: detected capacity change from 0 to 1024 [ 852.233253][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 852.286688][T20837] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 852.377584][T20837] EXT4-fs (loop3): group descriptors corrupted! 03:46:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, 0x0) [ 852.946128][T20846] loop3: detected capacity change from 0 to 1024 [ 853.047250][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, 0x0) [ 853.657064][T20855] loop3: detected capacity change from 0 to 1024 03:46:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 853.729921][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:36 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x0, &(0x7f00000000c0)) 03:46:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x81, 0x0) 03:46:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 853.976780][T20866] loop3: detected capacity change from 0 to 1024 [ 854.086277][T20871] loop2: detected capacity change from 0 to 1024 [ 854.189145][T20871] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 03:46:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x0, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 854.264788][T20871] EXT4-fs (loop2): group descriptors corrupted! [ 854.436297][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x0, &(0x7f00000000c0)) [ 854.587187][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 854.809403][T20883] loop2: detected capacity change from 0 to 1024 [ 854.937348][T20883] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 855.030903][T20883] EXT4-fs (loop2): group descriptors corrupted! 03:46:37 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x0, &(0x7f00000000c0)) 03:46:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 855.708950][T20892] loop2: detected capacity change from 0 to 1024 03:46:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 855.757499][ C1] net_ratelimit: 1 callbacks suppressed [ 855.757521][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 855.804521][T20892] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 855.819975][T20892] EXT4-fs (loop2): group descriptors corrupted! 03:46:38 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x0, &(0x7f00000000c0)) [ 855.944611][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 856.198445][T20903] loop2: detected capacity change from 0 to 1024 [ 856.282064][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 856.912591][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:42 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x0, &(0x7f00000000c0)) 03:46:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 859.646683][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 859.704876][T20927] loop2: detected capacity change from 0 to 1024 [ 859.706311][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 859.721826][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:42 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x0, &(0x7f00000000c0)) [ 860.385354][T20937] loop2: detected capacity change from 0 to 1024 03:46:43 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x0, &(0x7f00000000c0)) 03:46:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 861.072818][T20942] loop2: detected capacity change from 0 to 1024 03:46:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x0, &(0x7f00000000c0)) [ 861.554216][T20953] loop2: detected capacity change from 0 to 1024 03:46:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x0, &(0x7f00000000c0)) [ 861.865545][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x0, &(0x7f00000000c0)) [ 861.935479][T20960] loop2: detected capacity change from 0 to 1024 [ 862.011816][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 862.239225][T20968] loop2: detected capacity change from 0 to 21 [ 862.340720][T20968] EXT4-fs (loop2): bad geometry: block count 54 exceeds size of device (10 blocks) 03:46:46 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x0, &(0x7f00000000c0)) 03:46:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 863.657969][T20980] loop2: detected capacity change from 0 to 21 [ 863.723402][T20980] EXT4-fs (loop2): bad geometry: block count 54 exceeds size of device (10 blocks) 03:46:46 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x0, &(0x7f00000000c0)) [ 864.039037][T20988] loop2: detected capacity change from 0 to 21 [ 864.119762][T20988] EXT4-fs (loop2): bad geometry: block count 54 exceeds size of device (10 blocks) [ 864.664072][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x0, 0x0, 0x0, &(0x7f00000000c0)) 03:46:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x80000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000011000)="808100000018", 0x6, 0x15fc}], 0x0, &(0x7f00000000c0)) 03:46:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x0, 0x0, 0x0, &(0x7f00000000c0)) [ 866.876920][T21002] loop3: detected capacity change from 0 to 1024 [ 866.912950][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 866.978963][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 867.112366][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:49 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x0, 0x0, 0x0, &(0x7f00000000c0)) 03:46:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x0, &(0x7f00000000c0)) [ 867.681206][T21023] loop2: detected capacity change from 0 to 1024 [ 867.809788][T21023] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 867.834784][T21023] EXT4-fs (loop2): group descriptors corrupted! 03:46:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}], 0x0, &(0x7f00000000c0)) 03:46:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 868.243970][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 868.318007][T21032] loop2: detected capacity change from 0 to 1024 [ 868.358109][T21032] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 868.404215][T21032] EXT4-fs (loop2): group descriptors corrupted! [ 868.819156][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 869.727864][ T1359] ieee802154 phy0 wpan0: encryption failed: -22 [ 869.734217][ T1359] ieee802154 phy1 wpan1: encryption failed: -22 03:46:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000000040)="03", 0x1, 0x640}], 0x0, &(0x7f00000000c0)) 03:46:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 871.028814][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 871.051993][T21046] loop2: detected capacity change from 0 to 1024 [ 871.115791][T21046] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 871.145146][T21046] EXT4-fs (loop2): group descriptors corrupted! 03:46:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 871.525887][T21055] loop2: detected capacity change from 0 to 1024 [ 871.584310][T21055] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 03:46:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 871.726165][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 871.755261][T21055] EXT4-fs (loop2): group descriptors corrupted! [ 871.756247][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:54 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}], 0x0, &(0x7f00000000c0)) [ 872.218091][T21064] loop2: detected capacity change from 0 to 1024 [ 872.272740][T21064] EXT4-fs (loop2): unsupported descriptor size 0 [ 872.713850][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}], 0x0, &(0x7f00000000c0)) [ 872.923879][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 872.958157][T21075] loop2: detected capacity change from 0 to 1024 [ 873.071515][T21075] EXT4-fs (loop2): unsupported descriptor size 0 03:46:55 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}], 0x0, &(0x7f00000000c0)) [ 873.606134][T21085] loop2: detected capacity change from 0 to 1024 [ 873.703879][T21085] EXT4-fs (loop2): unsupported descriptor size 0 03:46:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 873.964834][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 874.058612][T21092] loop2: detected capacity change from 0 to 1024 [ 874.085101][T21092] EXT4-fs (loop2): unsupported descriptor size 0 03:46:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:56 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 874.319273][T21101] loop2: detected capacity change from 0 to 1024 [ 874.369100][T21101] EXT4-fs (loop2): unsupported descriptor size 0 [ 874.374666][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:46:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:46:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 875.382412][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 875.415072][T21114] loop2: detected capacity change from 0 to 1024 [ 875.482403][T21114] EXT4-fs (loop2): unsupported descriptor size 0 [ 875.804975][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}], 0x0, &(0x7f00000000c0)) 03:47:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 877.656305][T21129] loop2: detected capacity change from 0 to 1024 [ 877.715582][T21129] EXT4-fs (loop2): unsupported descriptor size 0 [ 877.736819][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 877.792792][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:00 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 877.846319][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 877.977094][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 878.044298][T21144] loop2: detected capacity change from 0 to 1024 [ 878.111656][T21144] EXT4-fs (loop2): unsupported descriptor size 0 03:47:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}], 0x0, &(0x7f00000000c0)) 03:47:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 878.862551][T21152] loop2: detected capacity change from 0 to 1024 [ 878.935614][T21152] EXT4-fs (loop2): unsupported descriptor size 0 03:47:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a", 0x10, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 879.018503][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 879.128919][T21161] loop2: detected capacity change from 0 to 1024 [ 879.180050][T21161] EXT4-fs (loop2): unsupported descriptor size 0 03:47:01 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a", 0x10, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 879.388810][T21172] loop2: detected capacity change from 0 to 1024 [ 879.421130][T21172] EXT4-fs (loop2): unsupported descriptor size 0 03:47:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a", 0x10, 0x4e0}], 0x0, &(0x7f00000000c0)) 03:47:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 879.656442][T21181] loop2: detected capacity change from 0 to 1024 [ 879.696973][T21181] EXT4-fs (loop2): unsupported descriptor size 0 03:47:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c89", 0x18, 0x4e0}], 0x0, &(0x7f00000000c0)) 03:47:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 880.017651][T21197] loop2: detected capacity change from 0 to 1024 [ 880.092365][T21197] EXT4-fs (loop2): unsupported descriptor size 0 [ 880.127068][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 880.174152][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c89", 0x18, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 880.214095][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 880.294027][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 880.399588][T21207] loop2: detected capacity change from 0 to 1024 [ 880.455371][T21207] EXT4-fs (loop2): unsupported descriptor size 0 03:47:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c89", 0x18, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 880.970424][T21213] loop2: detected capacity change from 0 to 1024 [ 881.070581][T21213] EXT4-fs (loop2): unsupported descriptor size 0 03:47:03 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045", 0x1c, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 881.473715][T21220] loop2: detected capacity change from 0 to 1024 [ 881.527477][T21220] EXT4-fs (loop2): unsupported descriptor size 0 03:47:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045", 0x1c, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 881.853338][T21226] loop2: detected capacity change from 0 to 1024 [ 881.883304][T16372] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 881.939146][T21226] EXT4-fs (loop2): unsupported descriptor size 0 03:47:04 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045", 0x1c, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 882.339301][T21232] loop2: detected capacity change from 0 to 1024 [ 882.463566][T21232] EXT4-fs (loop2): unsupported descriptor size 0 03:47:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f2800450100", 0x1e, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 882.720640][T21238] loop2: detected capacity change from 0 to 1024 [ 882.755704][T21238] EXT4-fs (loop2): unsupported descriptor size 0 03:47:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 882.978392][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:05 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f2800450100", 0x1e, 0x4e0}], 0x0, &(0x7f00000000c0)) 03:47:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 883.399460][T21255] loop2: detected capacity change from 0 to 1024 [ 883.481087][T21255] EXT4-fs (loop2): unsupported descriptor size 0 [ 883.527609][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 883.545810][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f2800450100", 0x1e, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 883.606623][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 883.790450][T21265] loop2: detected capacity change from 0 to 1024 [ 883.839290][T21265] EXT4-fs (loop2): unsupported descriptor size 0 03:47:06 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f}], 0x0, &(0x7f00000000c0)) [ 883.909371][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 884.176878][T21271] loop2: detected capacity change from 0 to 1024 [ 884.306883][T21271] EXT4-fs (loop2): unsupported descriptor size 0 03:47:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f}], 0x0, &(0x7f00000000c0)) [ 885.030068][T21278] loop2: detected capacity change from 0 to 1024 [ 885.081632][T21278] EXT4-fs (loop2): unsupported descriptor size 0 03:47:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f}], 0x0, &(0x7f00000000c0)) [ 885.662470][T21285] loop2: detected capacity change from 0 to 1024 [ 885.772699][T21285] EXT4-fs (loop2): unsupported descriptor size 0 03:47:08 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 886.299681][T21293] loop2: detected capacity change from 0 to 1024 [ 886.391875][T21293] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 03:47:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 887.089711][T21300] loop2: detected capacity change from 0 to 1024 [ 887.217011][T21300] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 03:47:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) 03:47:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c89", 0x18, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 889.566052][T21310] loop3: detected capacity change from 0 to 1024 [ 889.567030][T21309] loop2: detected capacity change from 0 to 1024 [ 889.595365][T21310] EXT4-fs (loop3): unsupported descriptor size 0 [ 889.645883][T21309] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 889.740915][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 889.767343][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:12 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 889.906891][T21329] loop2: detected capacity change from 0 to 1024 [ 889.934557][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 889.950800][T21329] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 03:47:12 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 890.066526][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 890.314586][T21339] loop2: detected capacity change from 0 to 1024 [ 890.375153][T21339] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 03:47:13 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 890.728712][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 890.992637][T21349] loop2: detected capacity change from 0 to 1024 [ 891.135542][T21349] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 891.408429][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 892.077392][T21358] loop2: detected capacity change from 0 to 1024 [ 892.108334][T21358] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 03:47:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) 03:47:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 893.342313][T21370] loop2: detected capacity change from 0 to 1024 [ 893.367772][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 893.382023][T21370] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 893.418753][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 894.145946][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) 03:47:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 895.954095][T21387] loop2: detected capacity change from 0 to 1024 [ 895.967307][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 896.064576][T21387] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 896.093582][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:18 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 896.319117][T21399] loop2: detected capacity change from 0 to 1024 [ 896.362421][T21399] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 896.420450][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:19 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 896.727645][T21407] loop2: detected capacity change from 0 to 1024 [ 896.752444][T21407] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 03:47:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 897.040845][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:20 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) 03:47:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 898.007888][T21422] loop2: detected capacity change from 0 to 1024 [ 898.073322][T21422] EXT4-fs (loop2): VFS: Can't find ext4 filesystem [ 898.157334][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 898.228434][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 898.232926][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) 03:47:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 899.602904][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 899.603366][T21443] loop2: detected capacity change from 0 to 1024 [ 899.631462][T21443] EXT4-fs (loop2): invalid first ino: 0 [ 899.658565][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 899.666325][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:22 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 900.401181][T21462] loop2: detected capacity change from 0 to 1024 03:47:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 900.494855][T21462] EXT4-fs (loop2): invalid first ino: 0 03:47:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:23 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 900.900783][T21472] loop2: detected capacity change from 0 to 1024 [ 900.977617][ C0] net_ratelimit: 2 callbacks suppressed [ 900.977671][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 901.053207][T21472] EXT4-fs (loop2): invalid first ino: 0 03:47:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:24 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 901.971961][T21485] loop2: detected capacity change from 0 to 1024 [ 902.033909][T21485] EXT4-fs (loop2): fragment/cluster size (16384) != block size (1024) [ 902.109210][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:26 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) 03:47:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 903.604625][T21500] loop2: detected capacity change from 0 to 1024 [ 903.648686][T21500] EXT4-fs (loop2): fragment/cluster size (16384) != block size (1024) [ 903.718981][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 903.825348][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 903.835424][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 903.969578][T21510] loop2: detected capacity change from 0 to 1024 [ 904.032626][T21510] EXT4-fs (loop2): fragment/cluster size (16384) != block size (1024) 03:47:26 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 904.594727][T21518] loop2: detected capacity change from 0 to 1024 [ 904.680206][T21518] EXT4-fs (loop2): fragment/cluster size (16384) != block size (1024) 03:47:27 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 905.149831][T21524] loop2: detected capacity change from 0 to 1024 [ 905.250038][T21524] EXT4-fs (loop2): fragment/cluster size (16384) != block size (1024) 03:47:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 905.926538][T21531] loop2: detected capacity change from 0 to 1024 [ 906.035159][T21531] EXT4-fs (loop2): fragment/cluster size (16384) != block size (1024) 03:47:28 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 906.345065][T21535] loop2: detected capacity change from 0 to 1024 [ 906.381106][T21535] EXT4-fs (loop2): fragment/cluster size (16384) != block size (1024) 03:47:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) 03:47:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 906.935899][T21548] loop2: detected capacity change from 0 to 1024 [ 907.019019][T21548] EXT4-fs (loop2): fragment/cluster size (16384) != block size (1024) [ 907.049765][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:29 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 907.286530][T21563] loop2: detected capacity change from 0 to 1024 [ 907.325309][T21563] EXT4-fs (loop2): fragment/cluster size (16384) != block size (1024) [ 907.383205][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 907.619070][T21570] loop2: detected capacity change from 0 to 1024 03:47:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 907.672800][T21570] EXT4-fs (loop2): fragment/cluster size (16384) != block size (1024) 03:47:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 907.847059][T21575] loop2: detected capacity change from 0 to 1024 [ 907.885073][T21575] EXT4-fs (loop2): fragment/cluster size (16384) != block size (1024) 03:47:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:30 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 908.230756][T21587] loop2: detected capacity change from 0 to 1024 [ 908.297987][T21587] EXT4-fs (loop2): fragment/cluster size (16384) != block size (1024) [ 908.413010][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 908.543363][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 908.712115][T21594] loop2: detected capacity change from 0 to 1024 [ 908.786425][T21594] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 03:47:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 909.115445][T21606] loop2: detected capacity change from 0 to 1024 [ 909.195668][T21606] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 03:47:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f00000000c0)) [ 909.716064][T21619] loop2: detected capacity change from 0 to 1024 [ 909.805116][T21619] EXT4-fs (loop2): VFS: Can't find ext4 filesystem 03:47:32 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, 0x0) [ 910.231063][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 910.312225][T21627] loop2: detected capacity change from 0 to 1024 03:47:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, 0x0) 03:47:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:33 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, 0x0) 03:47:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 911.120379][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 911.127995][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 911.159604][T21646] loop2: detected capacity change from 0 to 1024 03:47:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 911.577056][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 911.626445][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 912.022810][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 912.426568][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 912.481202][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 913.148751][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 913.359549][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 913.825554][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 914.004829][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 914.318853][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 914.627672][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 914.698289][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:37 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 915.264032][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp, 0x0, 0x0, 0x42821539, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp, 0x0, 0x0, 0x42821539, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:40 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 917.925640][ C1] net_ratelimit: 5 callbacks suppressed [ 917.925776][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 918.109323][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 918.739893][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 918.746123][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:43 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0xff, 0x4, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp, 0x0, 0x0, 0x42821539, 0x0, 0x0, 0xffff, 0x5, 0x0, 0x6}, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 921.137968][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 921.473462][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:44 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 921.909041][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 921.914680][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 922.651129][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 922.829636][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 923.301277][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 924.317024][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 924.865194][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:47 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 925.177458][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 928.860544][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 928.933502][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 929.465855][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 929.768567][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 929.817091][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 929.995121][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 931.154082][ T1359] ieee802154 phy0 wpan0: encryption failed: -22 [ 931.160475][ T1359] ieee802154 phy1 wpan1: encryption failed: -22 03:47:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 932.237265][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 932.707493][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 935.516460][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 935.575968][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 936.147156][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:47:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:47:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040), 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 937.782426][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 937.890098][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 937.958722][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:48:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 939.202523][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 939.381257][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:48:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040), 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 940.044590][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:48:02 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040), 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 940.238252][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:48:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, 0x0, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:04 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 941.664321][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 941.772113][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:48:04 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r1 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) listen(0xffffffffffffffff, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 942.275375][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:48:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 943.343972][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:48:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 943.646789][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:48:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 943.801890][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:48:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 944.032003][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:48:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r1 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) listen(0xffffffffffffffff, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 944.249756][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:48:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 944.544755][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 944.923050][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:48:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:08 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:08 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) getpid() sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:09 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r1 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) listen(0xffffffffffffffff, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:09 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x0, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 947.148559][ C1] net_ratelimit: 5 callbacks suppressed [ 947.148676][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 947.397303][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 947.943924][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:48:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x0, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x0, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 948.667552][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 948.736671][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:48:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x0, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 949.780324][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 949.784345][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 949.831164][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:48:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r1 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) listen(r0, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 950.838329][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:48:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:14 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 951.698683][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:48:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 952.627785][ C1] net_ratelimit: 3 callbacks suppressed [ 952.627863][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:48:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r1 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) listen(r0, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r1 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000380)) listen(r0, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:18 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 955.747920][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 955.765921][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:48:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 956.812631][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 956.831002][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 956.926594][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 957.085705][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:48:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:20 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 957.977556][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:48:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 958.242504][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:48:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 959.050297][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 959.135960][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:48:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 960.042936][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:48:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:22 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 960.246536][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 960.249056][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:48:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:23 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 961.142183][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 03:48:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r2 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, 0x0, 0x0) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 961.315177][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 961.341618][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 961.908666][T22131] ------------[ cut here ]------------ [ 961.915058][T22131] WARNING: CPU: 0 PID: 22131 at drivers/gpu/drm/drm_gem_shmem_helper.c:562 drm_gem_shmem_vm_open+0x96/0xb0 [ 961.978127][T22131] Modules linked in: [ 961.982338][T22131] CPU: 0 PID: 22131 Comm: syz-executor.5 Not tainted 5.14.0-next-20210901-syzkaller #0 03:48:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 962.188976][T22131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 962.214565][T22131] RIP: 0010:drm_gem_shmem_vm_open+0x96/0xb0 03:48:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 962.243856][T22131] Code: 89 c6 e8 1d ed 22 fd 85 db 75 1a e8 d4 e5 22 fd 48 89 ef 5b 5d 41 5c e9 d8 66 f5 ff e8 c3 e5 22 fd 0f 0b eb ca e8 ba e5 22 fd <0f> 0b eb dd e8 11 0b 69 fd eb 89 e8 0a 0b 69 fd eb a8 0f 1f 84 00 [ 962.407610][T22131] RSP: 0018:ffffc9000c2ffb90 EFLAGS: 00010216 [ 962.449064][T22131] RAX: 000000000000013b RBX: 00000000fffffffc RCX: ffffc90014a12000 [ 962.549558][T22131] RDX: 0000000000040000 RSI: ffffffff84532406 RDI: 0000000000000003 [ 962.596050][T22131] RBP: ffff88801dbc2840 R08: 0000000000000000 R09: 0000000000000000 [ 962.636316][T22131] R10: ffffffff845323e3 R11: 0000000000000001 R12: ffff888145dba000 [ 962.686681][T22131] R13: ffff8880884a6210 R14: 0000000020166000 R15: ffff88801dbc28d0 [ 962.741111][T22131] FS: 00007f18a8d05700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 03:48:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 962.784547][T22131] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 962.835244][T22131] CR2: 00007ffecc15dc37 CR3: 0000000081c5c000 CR4: 00000000001506e0 [ 962.849782][T22131] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 962.877336][T22131] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 962.886650][T22131] Call Trace: [ 962.897515][T22131] ? drm_gem_shmem_fault+0x2d0/0x2d0 [ 962.902909][T22131] __split_vma+0x23c/0x550 03:48:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 962.936647][T22131] __do_munmap+0x32a/0x11c0 [ 962.952037][T22131] mmap_region+0x2fd/0x18a0 [ 962.984030][T22131] ? __sanitizer_cov_trace_const_cmp4+0x7/0x70 [ 963.006636][T22131] do_mmap+0x869/0xfb0 [ 963.025034][T22131] vm_mmap_pgoff+0x1b7/0x290 03:48:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() ioprio_get$pid(0xacf5b7fcf813393e, 0x0) sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) 03:48:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "4f974974d2a632be", "000000000000000080000000ff00", "0e380795", "e57caddc916ca8d9"}, 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 963.188894][T22131] ? randomize_stack_top+0x100/0x100 [ 963.194343][T22131] ? __fget_files+0x23d/0x3e0 [ 963.235928][ C0] net_ratelimit: 3 callbacks suppressed [ 963.235947][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 963.299651][T22131] ksys_mmap_pgoff+0x4a8/0x620 [ 963.331089][T22131] ? mlock_future_check+0x120/0x120 [ 963.371683][T22131] ? syscall_enter_from_user_mode+0x21/0x70 03:48:26 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) listen(r1, 0x0) r3 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000006, 0x12, r3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080), 0x152) mmap(&(0x7f0000166000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xe0ffffff, 0x0, 0x0, 0xd8) [ 963.422521][T22131] do_syscall_64+0x35/0xb0 [ 963.468940][T22131] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 963.518913][T22131] RIP: 0033:0x4665f9 [ 963.554344][T22131] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 963.651512][T22131] RSP: 002b:00007f18a8d05188 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 963.694709][T22131] RAX: ffffffffffffffda RBX: 000000000056c260 RCX: 00000000004665f9 [ 963.741857][T22131] RDX: 0000000000000000 RSI: 0000000000002000 RDI: 0000000020166000 [ 963.779874][T22131] RBP: 00000000004bfcc4 R08: 0000000000000004 R09: 0000000000000000 [ 963.824396][T22131] R10: 0000000000000013 R11: 0000000000000246 R12: 000000000056c260 [ 963.877124][T22131] R13: 00007ffdf3e4419f R14: 00007f18a8d05300 R15: 0000000000022000 [ 963.885154][T22131] Kernel panic - not syncing: panic_on_warn set ... [ 963.891746][T22131] CPU: 0 PID: 22131 Comm: syz-executor.5 Not tainted 5.14.0-next-20210901-syzkaller #0 [ 963.901390][T22131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 963.911452][T22131] Call Trace: [ 963.914736][T22131] dump_stack_lvl+0xcd/0x134 [ 963.919347][T22131] panic+0x2b0/0x6dd [ 963.923299][T22131] ? __warn_printk+0xf3/0xf3 [ 963.927920][T22131] ? __warn.cold+0x1a/0x44 [ 963.932363][T22131] ? drm_gem_shmem_vm_open+0x96/0xb0 [ 963.937675][T22131] __warn.cold+0x35/0x44 [ 963.941941][T22131] ? drm_gem_shmem_vm_open+0x96/0xb0 [ 963.947242][T22131] report_bug+0x1bd/0x210 [ 963.951653][T22131] handle_bug+0x3c/0x60 [ 963.955819][T22131] exc_invalid_op+0x14/0x40 [ 963.960336][T22131] asm_exc_invalid_op+0x12/0x20 [ 963.965209][T22131] RIP: 0010:drm_gem_shmem_vm_open+0x96/0xb0 [ 963.971121][T22131] Code: 89 c6 e8 1d ed 22 fd 85 db 75 1a e8 d4 e5 22 fd 48 89 ef 5b 5d 41 5c e9 d8 66 f5 ff e8 c3 e5 22 fd 0f 0b eb ca e8 ba e5 22 fd <0f> 0b eb dd e8 11 0b 69 fd eb 89 e8 0a 0b 69 fd eb a8 0f 1f 84 00 [ 963.990740][T22131] RSP: 0018:ffffc9000c2ffb90 EFLAGS: 00010216 [ 963.996822][T22131] RAX: 000000000000013b RBX: 00000000fffffffc RCX: ffffc90014a12000 [ 964.004802][T22131] RDX: 0000000000040000 RSI: ffffffff84532406 RDI: 0000000000000003 [ 964.012779][T22131] RBP: ffff88801dbc2840 R08: 0000000000000000 R09: 0000000000000000 [ 964.020764][T22131] R10: ffffffff845323e3 R11: 0000000000000001 R12: ffff888145dba000 [ 964.028747][T22131] R13: ffff8880884a6210 R14: 0000000020166000 R15: ffff88801dbc28d0 [ 964.030094][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 964.036730][T22131] ? drm_gem_shmem_vm_open+0x73/0xb0 [ 964.053117][T22131] ? drm_gem_shmem_vm_open+0x96/0xb0 [ 964.058427][T22131] ? drm_gem_shmem_fault+0x2d0/0x2d0 [ 964.063728][T22131] __split_vma+0x23c/0x550 [ 964.068165][T22131] __do_munmap+0x32a/0x11c0 [ 964.072710][T22131] mmap_region+0x2fd/0x18a0 [ 964.077232][T22131] ? __sanitizer_cov_trace_const_cmp4+0x7/0x70 [ 964.083421][T22131] do_mmap+0x869/0xfb0 [ 964.087521][T22131] vm_mmap_pgoff+0x1b7/0x290 [ 964.092134][T22131] ? randomize_stack_top+0x100/0x100 [ 964.097436][T22131] ? __fget_files+0x23d/0x3e0 [ 964.102139][T22131] ksys_mmap_pgoff+0x4a8/0x620 [ 964.106921][T22131] ? mlock_future_check+0x120/0x120 [ 964.112134][T22131] ? syscall_enter_from_user_mode+0x21/0x70 [ 964.118049][T22131] do_syscall_64+0x35/0xb0 [ 964.122476][T22131] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 964.128389][T22131] RIP: 0033:0x4665f9 [ 964.132292][T22131] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 964.151914][T22131] RSP: 002b:00007f18a8d05188 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 964.160347][T22131] RAX: ffffffffffffffda RBX: 000000000056c260 RCX: 00000000004665f9 [ 964.168357][T22131] RDX: 0000000000000000 RSI: 0000000000002000 RDI: 0000000020166000 [ 964.176336][T22131] RBP: 00000000004bfcc4 R08: 0000000000000004 R09: 0000000000000000 [ 964.184316][T22131] R10: 0000000000000013 R11: 0000000000000246 R12: 000000000056c260 [ 964.192304][T22131] R13: 00007ffdf3e4419f R14: 00007f18a8d05300 R15: 0000000000022000 [ 964.201780][T22131] Kernel Offset: disabled [ 964.206328][T22131] Rebooting in 86400 seconds..