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"}]}]}, 0xec4}}, 0x0) syz_genetlink_get_family_id$smc(0x0, 0xffffffffffffffff) 02:46:00 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open$dir(0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x19) [ 461.950535][T24590] loop2: detected capacity change from 0 to 15 [ 461.951063][T24577] EXT4-fs error (device loop1): ext4_quota_enable:6435: comm syz-executor.1: Bad quota inode # 3 [ 461.969280][T24577] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-117). Please run e2fsck to fix. [ 461.985747][T24577] EXT4-fs (loop1): Cannot turn on quotas: error -117 [ 461.993823][T24577] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 02:46:00 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000001c0)="80810000003c2a2412c2ce97896265f7f2d6b561d87fd91f1bb1f3aa6da0481c9d907d", 0x23, 0x1600}], 0x81, &(0x7f0000000180)) 02:46:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)) 02:46:00 executing program 5: r0 = getpgrp(0xffffffffffffffff) r1 = getpgrp(0x0) rt_tgsigqueueinfo(r1, r0, 0x10, &(0x7f0000000040)={0x0, 0x0, 0x10000}) 02:46:00 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0) [ 462.070804][T24590] Dev loop2: unable to read RDB block 15 [ 462.142779][T24590] loop2: unable to read partition table [ 462.170734][T24590] loop2: partition table beyond EOD, truncated 02:46:00 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$NL80211_CMD_FLUSH_PMKSA(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) [ 462.230779][T24590] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 462.265877][T24610] loop4: detected capacity change from 0 to 69632 [ 462.268055][T24608] loop1: detected capacity change from 0 to 1051 02:46:00 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000580)={'ah\x00'}, &(0x7f00000005c0)=0x1e) 02:46:00 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x8181, 0x0) write$UHID_SET_REPORT_REPLY(r0, 0x0, 0x0) 02:46:00 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xbd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x2) 02:46:00 executing program 0: shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x4000) madvise(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x3) [ 462.384588][T24610] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 02:46:00 executing program 5: syz_open_dev$vcsa(&(0x7f0000000000), 0x5, 0x502) 02:46:00 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000001c0)="80810000003c2a2412c2ce97896265f7f2d6b561d87fd91f1bb1f3aa6da0481c9d907d", 0x23, 0x1600}], 0x81, &(0x7f0000000180)) 02:46:00 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open$dir(0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x19) 02:46:00 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000000a40)={0x0, 0x989680}) 02:46:00 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) 02:46:00 executing program 3: clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)={0xffff}, &(0x7f0000000240)={0x0, r0+10000000}, &(0x7f00000002c0)={&(0x7f0000000280)={[0x1]}, 0x8}) 02:46:00 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000002940), r0) sendmsg$NL802154_CMD_SET_CCA_MODE(r0, &(0x7f0000002a80)={&(0x7f0000002980), 0xc, &(0x7f0000002a40)={0x0}}, 0x0) 02:46:00 executing program 5: socket$inet(0x2, 0x2, 0x3) [ 462.681851][T24642] loop1: detected capacity change from 0 to 1051 [ 462.736597][T24648] loop4: detected capacity change from 0 to 69632 02:46:00 executing program 3: semop(0x0, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}, {}, {}], 0x3) 02:46:00 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000001c0)="80810000003c2a2412c2ce97896265f7f2d6b561d87fd91f1bb1f3aa6da0481c9d907d", 0x23, 0x1600}], 0x81, &(0x7f0000000180)) 02:46:00 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x410001) [ 462.834166][T24648] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 02:46:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000800)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_EEE_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_EEE_MODES_OURS={0xe44, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x1ac, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '@\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '!\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ']%/\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3117}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0xc91, 0x5, "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"}]}]}, 0xec4}}, 0x20000000) 02:46:01 executing program 3: ioprio_set$uid(0x0, 0xffffffffffffffff, 0x0) 02:46:01 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x2}}) 02:46:01 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open$dir(0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x19) [ 463.085561][T24673] loop1: detected capacity change from 0 to 1051 02:46:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000280)={'icmp\x00'}, &(0x7f00000002c0)=0x1e) 02:46:01 executing program 3: syz_open_dev$vcsa(&(0x7f0000000180), 0xffffffffffffffff, 0x0) 02:46:01 executing program 2: pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0x2}, &(0x7f0000000100)={0x5}, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={[0x40]}, 0x8}) 02:46:01 executing program 5: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ff8000/0x3000)=nil, 0x7000) r1 = shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) shmdt(r1) mlock(&(0x7f0000ff8000/0x4000)=nil, 0x4000) r2 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r2, &(0x7f0000ff8000/0x3000)=nil, 0x7000) 02:46:01 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000001c0)="80810000003c2a2412c2ce97896265f7f2d6b561d87fd91f1bb1f3aa6da0481c9d907d", 0x23, 0x1600}], 0x81, &(0x7f0000000180)) 02:46:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000000)=@gcm_128={{}, "68438e9f2b16be4e", "a310e7d8f885196df36d3638777faa4e", "da438999", "81d4f249d35af15e"}, 0x28) [ 463.272889][T24690] loop4: detected capacity change from 0 to 69632 02:46:01 executing program 2: r0 = fork() r1 = getpgrp(0x0) rt_tgsigqueueinfo(r1, r0, 0x0, &(0x7f0000000240)={0x0, 0x0, 0x4}) 02:46:01 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) clock_gettime(0x0, &(0x7f0000002b80)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000002b00)=[{{&(0x7f0000000b00)=@can, 0x80, &(0x7f0000002300)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x2101, &(0x7f0000002bc0)={0x0, r1+60000000}) [ 463.400759][T24700] loop1: detected capacity change from 0 to 1051 02:46:01 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001240)={0xffffffffffffffff}) accept4(r0, 0x0, 0x0, 0x0) 02:46:01 executing program 5: syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x200000) 02:46:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:01 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000001c0)="80810000003c2a2412c2ce97896265f7f2d6b561d87fd91f1bb1f3aa6da0481c9d907d", 0x23, 0x1600}], 0x81, &(0x7f0000000180)) 02:46:01 executing program 0: syz_genetlink_get_family_id$nbd(&(0x7f00000001c0), 0xffffffffffffffff) fork() 02:46:01 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x109040) [ 463.660949][T24724] loop1: detected capacity change from 0 to 1051 02:46:01 executing program 4: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0xc4200) 02:46:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000200), 0x14) 02:46:01 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000001c0)="80810000003c2a2412c2ce97896265f7f2d6b561d87fd91f1bb1f3aa6da0481c9d907d", 0x23, 0x1600}], 0x81, &(0x7f0000000180)) 02:46:01 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x4a8e1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) 02:46:01 executing program 4: r0 = gettid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x80000001}) 02:46:01 executing program 2: socketpair(0x10, 0x0, 0x6, &(0x7f0000001200)) 02:46:02 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000001c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000200)) 02:46:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 463.953689][T24746] loop1: detected capacity change from 0 to 1051 02:46:02 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000001c0)="80810000003c2a2412c2ce97896265f7f2d6b561d87fd91f1bb1f3aa6da0481c9d907d", 0x23, 0x1600}], 0x81, &(0x7f0000000180)) 02:46:02 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000200)=0x10) 02:46:02 executing program 5: socketpair(0xf, 0x0, 0x0, &(0x7f0000001200)) 02:46:02 executing program 2: close(0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) syz_io_uring_setup(0x0, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00005c0000/0x4000)=nil, 0x0, 0x0) [ 464.158484][T24763] loop1: detected capacity change from 0 to 22 [ 464.176129][T24764] loop4: detected capacity change from 0 to 69632 [ 464.178434][T24763] EXT4-fs (loop1): bad geometry: block count 512 exceeds size of device (11 blocks) [ 464.206565][T24764] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 464.224834][T24764] EXT4-fs error (device loop4): ext4_map_blocks:594: inode #2: block 9: comm syz-executor.4: lblock 0 mapped to illegal pblock 9 (length 1) 02:46:02 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000001c0)="80810000003c2a2412c2ce97896265f7f2d6b561d87fd91f1bb1f3aa6da0481c9d907d", 0x23, 0x1600}], 0x81, &(0x7f0000000180)) 02:46:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 464.290263][T24764] EXT4-fs error (device loop4): ext4_readdir:258: inode #2: block 16: comm syz-executor.4: path /root/syzkaller-testdir365427973/syzkaller.UVemo3/622/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=4096 fake=0 [ 464.326029][T24779] loop2: detected capacity change from 0 to 69632 02:46:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000780)='bic\x00', 0x4) 02:46:02 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 464.399948][T24784] loop1: detected capacity change from 0 to 22 [ 464.407025][T24779] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 464.425232][T24779] EXT4-fs error (device loop2): ext4_map_blocks:594: inode #2: block 9: comm syz-executor.2: lblock 0 mapped to illegal pblock 9 (length 1) 02:46:02 executing program 5: r0 = socket(0x2, 0x2, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 02:46:02 executing program 0: r0 = shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x6000) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) shmdt(r0) [ 464.461925][T24784] EXT4-fs (loop1): bad geometry: block count 512 exceeds size of device (11 blocks) [ 464.471479][T24779] EXT4-fs error (device loop2): ext4_readdir:258: inode #2: block 16: comm syz-executor.2: path /root/syzkaller-testdir468337911/syzkaller.Avv6GH/549/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=4096 fake=0 02:46:02 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000001c0)="80810000003c2a2412c2ce97896265f7f2d6b561d87fd91f1bb1f3aa6da0481c9d907d", 0x23, 0x1600}], 0x81, &(0x7f0000000180)) 02:46:02 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000001480)={'sit0\x00', &(0x7f0000001400)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1, @loopback}}) 02:46:02 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000002d00), 0x0, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) [ 464.644909][T24802] loop4: detected capacity change from 0 to 69632 [ 464.680063][T24802] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 02:46:02 executing program 0: prlimit64(0x0, 0x8, &(0x7f0000000000)={0x0, 0xfffffffffffffffa}, 0x0) [ 464.693844][T24805] loop1: detected capacity change from 0 to 22 02:46:02 executing program 5: socketpair(0x10, 0x2, 0x0, &(0x7f0000001200)) 02:46:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 464.731453][T24805] EXT4-fs (loop1): bad geometry: block count 512 exceeds size of device (11 blocks) [ 464.755478][T24802] EXT4-fs error (device loop4): ext4_map_blocks:594: inode #2: block 9: comm syz-executor.4: lblock 0 mapped to illegal pblock 9 (length 1) 02:46:02 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x0, 0x0, 0x81, &(0x7f0000000180)) [ 464.882483][T24802] EXT4-fs error (device loop4): ext4_readdir:258: inode #2: block 16: comm syz-executor.4: path /root/syzkaller-testdir365427973/syzkaller.UVemo3/623/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=4096 fake=0 02:46:03 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000a00)=ANY=[@ANYBLOB="24040000190001000000000000000000ff020000000000000000000000000001fe80000000000000000000000000000000000000000000000a00008000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x424}}, 0x0) 02:46:03 executing program 0: syz_open_dev$vcsa(0x0, 0x0, 0x0) fork() 02:46:03 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:03 executing program 5: r0 = gettid() r1 = getpgrp(0x0) rt_tgsigqueueinfo(r1, r0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) 02:46:03 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x0, 0x0, 0x81, &(0x7f0000000180)) 02:46:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 465.151387][T24832] netlink: 292 bytes leftover after parsing attributes in process `syz-executor.2'. 02:46:03 executing program 0: syz_read_part_table(0x0, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000000)="f8fd4d205f8b481e57", 0x9, 0xfff}, {0x0}, {&(0x7f0000000140)="05", 0x1, 0x3e4}, {&(0x7f0000000200)="b76f6468123224b8de1e9b4dddaa544c2ad8f26cb2bd0bf67ae7bd6c2f897887214e7e92c63f612e9c86fea43fb6a9c080eafefc6d8a2455ba963ed6ff8841bbf2be1ab5ff02c22b4d1ed35f66ec4aeda319dd3a7131d036deb1272b12348659efbe4251d4d69268c3c5529b82e98ab08d53e3766feb927a23f5083cf1e0517a93a58357020717dc9fcb105876d6529fc822826b06e173", 0x97, 0x8}]) 02:46:03 executing program 2: syz_read_part_table(0x0, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000000), 0x0, 0xfff}, {0x0}]) 02:46:03 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x0, 0x0, 0x81, &(0x7f0000000180)) 02:46:03 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$NL802154_CMD_SET_CCA_MODE(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000780)='bic\x00', 0x4) [ 465.432719][T24845] loop4: detected capacity change from 0 to 69632 [ 465.505116][T24849] loop0: detected capacity change from 0 to 15 [ 465.522890][T24854] loop2: detected capacity change from 0 to 15 [ 465.558706][T24845] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 465.602073][T24849] Dev loop0: unable to read RDB block 15 [ 465.617792][T24854] Dev loop2: unable to read RDB block 15 02:46:03 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 02:46:03 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, &(0x7f0000000040)) 02:46:03 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 465.660219][T24849] loop0: unable to read partition table 02:46:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 465.713322][T24854] loop2: unable to read partition table [ 465.719942][T24854] loop2: partition table beyond EOD, truncated [ 465.750762][T24849] loop0: partition table beyond EOD, truncated 02:46:03 executing program 5: clock_gettime(0x0, &(0x7f0000002b80)) [ 465.782806][T24854] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 465.814954][T24869] loop1: detected capacity change from 0 to 1051 [ 465.822202][T24849] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 02:46:03 executing program 2: socketpair(0x11, 0x0, 0x0, &(0x7f0000001200)) [ 465.876583][T24869] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 465.895572][T24872] loop4: detected capacity change from 0 to 69632 [ 465.914377][T24849] loop0: detected capacity change from 0 to 15 [ 465.932953][T24869] EXT4-fs (loop1): orphan cleanup on readonly fs [ 465.944146][T24849] Dev loop0: unable to read RDB block 15 [ 465.950482][T24849] loop0: unable to read partition table [ 465.956446][T24849] loop0: partition table beyond EOD, truncated [ 465.967145][T24869] EXT4-fs error (device loop1): ext4_quota_enable:6435: comm syz-executor.1: Bad quota inode # 3 [ 465.967797][T24872] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 465.979453][T24849] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 02:46:04 executing program 0: r0 = shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x4000) clone(0x0, 0x0, 0x0, 0x0, 0x0) shmdt(r0) 02:46:04 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CCA_MODE(r0, 0x0, 0x0) [ 465.997738][T24869] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. 02:46:04 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0xb28, 0x0) 02:46:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 466.135314][T24869] EXT4-fs (loop1): Cannot turn on quotas: error -116 02:46:04 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) open(0x0, 0x141042, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc03}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0xc5, 0x2) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400), 0x24380, 0x0) ioctl$FICLONE(r1, 0x40049409, r0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) open$dir(&(0x7f0000000080)='./file1\x00', 0x82903, 0x161) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0}) [ 466.201510][T24869] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 02:46:04 executing program 4: getdents64(0xffffffffffffffff, 0x0, 0x19) 02:46:04 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 02:46:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0, @remote}}) 02:46:04 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000000), 0x0) [ 466.326433][ C0] sd 0:0:1:0: [sg0] tag#5362 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 466.337211][ C0] sd 0:0:1:0: [sg0] tag#5362 CDB: opcode=0xe5 (vendor) [ 466.344225][ C0] sd 0:0:1:0: [sg0] tag#5362 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 466.353916][ C0] sd 0:0:1:0: [sg0] tag#5362 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 466.363507][ C0] sd 0:0:1:0: [sg0] tag#5362 CDB[20]: ba 02:46:04 executing program 5: move_pages(0x0, 0x10, &(0x7f0000000000)=[&(0x7f0000ffc000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) [ 466.493631][ C1] sd 0:0:1:0: [sg0] tag#5363 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 466.504132][ C1] sd 0:0:1:0: [sg0] tag#5363 CDB: opcode=0xe5 (vendor) [ 466.511222][ C1] sd 0:0:1:0: [sg0] tag#5363 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 466.520923][ C1] sd 0:0:1:0: [sg0] tag#5363 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 466.530650][ C1] sd 0:0:1:0: [sg0] tag#5363 CDB[20]: ba 02:46:04 executing program 0: pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f00000001c0)={0xffff}, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={[0x1]}, 0x8}) 02:46:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 02:46:04 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x21, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f3904cf12dba", 0x0, 0x0, 0x0, 0x0, 0x0}) open(0x0, 0x141042, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc03}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0xc5, 0x2) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400), 0x24380, 0x0) ioctl$FICLONE(r1, 0x40049409, r0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) open$dir(&(0x7f0000000080)='./file1\x00', 0x82903, 0x161) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0}) 02:46:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:04 executing program 5: rt_tgsigqueueinfo(0x0, 0x0, 0x1a, &(0x7f0000000080)={0x0, 0x0, 0x3}) 02:46:04 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @result={0x100}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) tkill(r1, 0x37) [ 466.686897][ C1] sd 0:0:1:0: [sg0] tag#5364 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 466.697409][ C1] sd 0:0:1:0: [sg0] tag#5364 CDB: opcode=0xe5 (vendor) [ 466.704357][ C1] sd 0:0:1:0: [sg0] tag#5364 CDB[00]: e5 f4 32 73 2f 4e 09 6d 26 e2 c7 35 d1 35 12 1c [ 466.713985][ C1] sd 0:0:1:0: [sg0] tag#5364 CDB[10]: 92 1b da 40 b8 58 5b a8 d4 7d 34 f3 90 4c f1 2d [ 466.723598][ C1] sd 0:0:1:0: [sg0] tag#5364 CDB[20]: ba [ 466.869165][T24937] loop1: detected capacity change from 0 to 1051 02:46:04 executing program 2: r0 = getpgrp(0x0) syz_open_procfs$namespace(r0, 0x0) 02:46:05 executing program 4: getdents64(0xffffffffffffffff, 0x0, 0x19) [ 466.913209][T24937] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 466.943443][T24944] ptrace attach of "/root/syz-executor.0"[24941] was attempted by "/root/syz-executor.0"[24944] [ 466.985803][T24937] EXT4-fs (loop1): orphan cleanup on readonly fs [ 467.000364][T24937] EXT4-fs error (device loop1): ext4_quota_enable:6435: comm syz-executor.1: Bad quota inode # 3 [ 467.022069][T24937] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 467.149060][T24937] EXT4-fs (loop1): Cannot turn on quotas: error -116 [ 467.163428][T24937] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 02:46:05 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}], 0x81, &(0x7f0000000180)) 02:46:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 02:46:05 executing program 0: syz_open_dev$sg(0x0, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) read$char_usb(r0, &(0x7f00000000c0)=""/64, 0xfffffff2) 02:46:05 executing program 2: clock_gettime(0x0, &(0x7f0000000200)={0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={r0}, 0x0) 02:46:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:05 executing program 4: getdents64(0xffffffffffffffff, 0x0, 0x19) 02:46:05 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000001c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, 0x0) 02:46:05 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 467.551002][T24968] loop1: detected capacity change from 0 to 1051 02:46:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 467.639200][T24968] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 467.698542][T24968] EXT4-fs (loop1): orphan cleanup on readonly fs 02:46:05 executing program 5: shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x4000) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ffb000/0x1000)=nil) 02:46:05 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 467.744744][T24976] loop4: detected capacity change from 0 to 69632 [ 467.768136][T24968] EXT4-fs error (device loop1): ext4_quota_enable:6435: comm syz-executor.1: Bad quota inode # 3 [ 467.779495][T24968] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 467.794353][T24968] EXT4-fs (loop1): Cannot turn on quotas: error -116 [ 467.801120][T24968] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 02:46:05 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0, 0x0, 0x1600}], 0x81, &(0x7f0000000180)) 02:46:06 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000001200)) r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000001240)) 02:46:06 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 468.113008][T24996] loop4: detected capacity change from 0 to 69632 [ 468.113369][T24995] loop1: detected capacity change from 0 to 1051 [ 468.226941][T24995] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 02:46:06 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000007c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4, 0x5}]}]}, 0x1c}}, 0x0) 02:46:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_setup(0x45db, &(0x7f0000000540)) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r1, &(0x7f0000000a40)=""/102400, 0x19000) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:06 executing program 5: syz_read_part_table(0x0, 0x3, &(0x7f00000004c0)=[{&(0x7f0000000000)="f8fd4d205f8b481e57", 0x9, 0xfff}, {&(0x7f0000000040)="c4d449016b38d1f64a82a67cb26cb600a83186d9215ae73e209e58ddf66ce4012db466db59244de332ca0519b2186ab423af807afc2d05f9c21d2c7ca41787daf7ebdd376786fd83b084c3ad146038e16d3e2d9b8c6b8a95e8fdbfa0ab12dd84415da27c6a8865acfc97c70b3903ba11d7c6b09d866cfb97709cc12a045b517bab787945b2403576b55b4b8b713fc8a24177661139f0153f1242bc9e6fa39f19a5dc28c0c983a52597c57b0ad197432d39b47307004702db57845da51745e1dae26339520f4f23dfdb42094e92c20af625cda8eb717abd3cea", 0xd9, 0x1}, {&(0x7f0000000140)="05ad49e0fd6a4f3b40e9398f8b287414fcb46ec67fe3532c8514db148cb06021e55a1a8bfc606a5319f8f2b171be9b2f94d250ebe67161115aa7cad21607cfd20cd2346b71c711189186408f8354c61d5789edb438a83f5aed03836fbc84c80f932cbf00090da5bfc684fd7480f97b5a7f1bd42ee97dbcce59996f0249999dd1af8052b19ec77bf17959aa06c183f9", 0x8f, 0x3e4}]) 02:46:06 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', 0x0, 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:06 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1d, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f390", 0x0, 0x0, 0x0, 0x0, 0x0}) open(0x0, 0x141042, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) open$dir(&(0x7f0000000080)='./file1\x00', 0x82903, 0x161) [ 468.294262][T24995] EXT4-fs (loop1): orphan cleanup on readonly fs [ 468.316520][T24995] EXT4-fs error (device loop1): ext4_quota_enable:6435: comm syz-executor.1: Bad quota inode # 3 [ 468.392962][T24995] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 468.407665][T24995] EXT4-fs (loop1): Cannot turn on quotas: error -116 [ 468.422360][T24995] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 468.457453][T25017] loop4: detected capacity change from 0 to 69632 02:46:06 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 468.530113][T25021] loop5: detected capacity change from 0 to 15 02:46:06 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', 0x0, 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:06 executing program 0: shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x4000) mlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) [ 468.650514][T25021] Dev loop5: unable to read RDB block 15 [ 468.678273][T25021] loop5: unable to read partition table [ 468.714763][T25021] loop5: partition table beyond EOD, truncated 02:46:06 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000380)={0x53, 0x0, 0x1d, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000200)="e5f432732f4e096d26e2c735d135121c921bda40b8585ba8d47d34f390", 0x0, 0x0, 0x0, 0x0, 0x0}) open(0x0, 0x141042, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) open$dir(&(0x7f0000000080)='./file1\x00', 0x82903, 0x161) [ 468.758619][T25021] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 468.764263][T25036] loop4: detected capacity change from 0 to 69632 [ 468.769958][T25037] loop1: detected capacity change from 0 to 1051 [ 468.792948][T25037] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 02:46:06 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', 0x0, 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 468.811225][T25021] loop5: detected capacity change from 0 to 15 [ 468.846787][T25037] EXT4-fs (loop1): orphan cleanup on readonly fs 02:46:06 executing program 0: r0 = socket(0x2, 0x2, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={0x0}}, 0x0) [ 468.853705][T25037] EXT4-fs error (device loop1): ext4_quota_enable:6435: comm syz-executor.1: Bad quota inode # 3 [ 468.864836][T25037] EXT4-fs warning (device loop1): ext4_enable_quotas:6472: Failed to enable quota tracking (type=0, err=-116). Please run e2fsck to fix. [ 468.879840][T25037] EXT4-fs (loop1): Cannot turn on quotas: error -116 [ 468.886914][T25021] Dev loop5: unable to read RDB block 15 [ 468.893661][T25021] loop5: unable to read partition table [ 468.900185][T25021] loop5: partition table beyond EOD, truncated [ 468.906532][T25037] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 468.950404][T25021] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 02:46:07 executing program 5: r0 = semget$private(0x0, 0x4, 0x0) semctl$GETZCNT(r0, 0x0, 0xf, 0x0) 02:46:07 executing program 0: sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, 0x0, 0x0) [ 469.063401][T25056] loop4: detected capacity change from 0 to 69632 02:46:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_setup(0x45db, &(0x7f0000000540)) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r1, &(0x7f0000000a40)=""/102400, 0x19000) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:07 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:07 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x4a8e1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) write$binfmt_misc(r1, &(0x7f0000001e40)=ANY=[], 0xffdc) 02:46:07 executing program 5: r0 = socket$inet(0x2, 0x3, 0x5) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)) 02:46:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000200000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000080)) [ 469.426182][T25075] loop1: detected capacity change from 0 to 1051 [ 469.445995][T25078] loop4: detected capacity change from 0 to 68 [ 469.514137][T25075] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 469.532610][T25078] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (8 blocks) [ 469.550233][T25075] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 469.577674][T25085] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 469.587881][T25088] loop0: detected capacity change from 0 to 4 [ 469.607398][T25088] EXT4-fs (loop0): can't read group descriptor 0 [ 469.643352][T25075] EXT4-fs (loop1): get root inode failed [ 469.649223][T25075] EXT4-fs (loop1): mount failed 02:46:07 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:07 executing program 5: r0 = shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x4000) mlock(&(0x7f0000ff8000/0x4000)=nil, 0x4000) shmdt(r0) 02:46:07 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) 02:46:07 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000001000)=0x80) 02:46:07 executing program 0: shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x4000) move_pages(0x0, 0x2, &(0x7f0000000000)=[&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil], 0x0, &(0x7f0000000040), 0x0) [ 469.854199][T25103] loop4: detected capacity change from 0 to 68 [ 469.871132][T25107] loop1: detected capacity change from 0 to 1051 [ 469.885433][T25103] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (8 blocks) [ 469.940803][T25107] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 469.974819][T25107] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 469.989164][T25107] EXT4-fs (loop1): get root inode failed [ 469.995179][T25107] EXT4-fs (loop1): mount failed 02:46:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_setup(0x45db, &(0x7f0000000540)) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r1, &(0x7f0000000a40)=""/102400, 0x19000) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:08 executing program 5: syz_read_part_table(0x0, 0x4, &(0x7f00000004c0)=[{&(0x7f0000000000), 0x0, 0xfff}, {0x0}, {&(0x7f0000000140)="05", 0x1, 0x3e4}, {&(0x7f0000000200)="b76f6468123224b8de1e9b4dddaa544c2ad8f26cb2bd0bf67ae7bd6c2f897887214e7e92c63f612e9c86fea43fb6a9c080eafefc6d8a2455ba963ed6ff8841bbf2be1ab5ff02c22b4d1ed35f66ec4aeda319dd3a7131d036deb1272b12348659efbe4251d4d69268c3c5529b82e98ab08d53e3766feb927a23f5083cf1e0517a93a58357020717dc9fcb105876d6529fc822826b06e173", 0x97, 0x8}]) 02:46:08 executing program 2: r0 = semget$private(0x0, 0x3, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)=[0x8ed8]) 02:46:08 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:08 executing program 0: pselect6(0x40, &(0x7f0000000080)={0x1}, 0x0, 0x0, 0x0, 0x0) 02:46:08 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {0x0}], 0x81, &(0x7f0000000180)) [ 470.464411][T25133] loop4: detected capacity change from 0 to 68 02:46:08 executing program 0: io_setup(0x7ff, &(0x7f00000000c0)=0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) io_submit(r0, 0x1, &(0x7f00000004c0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) [ 470.513474][T25138] loop1: detected capacity change from 0 to 1051 [ 470.514280][T25136] loop5: detected capacity change from 0 to 15 02:46:08 executing program 2: rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) [ 470.601763][T25138] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 470.616439][T25136] Dev loop5: unable to read RDB block 15 [ 470.634845][T25133] EXT4-fs (loop4): bad geometry: block count 512 exceeds size of device (8 blocks) [ 470.638689][T25136] loop5: unable to read partition table [ 470.672042][T25138] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 470.701654][T25138] EXT4-fs (loop1): get root inode failed [ 470.702769][T25136] loop5: partition table beyond EOD, [ 470.707782][T25138] EXT4-fs (loop1): mount failed [ 470.719102][T25136] truncated 02:46:08 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 470.723113][T25136] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 02:46:08 executing program 2: openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) 02:46:08 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 470.824063][T25136] loop5: detected capacity change from 0 to 15 02:46:08 executing program 0: clock_gettime(0x0, &(0x7f0000000140)={0x0}) pselect6(0x40, &(0x7f0000000080)={0x1}, 0x0, &(0x7f0000000100)={0x5}, &(0x7f0000000180)={r0}, 0x0) [ 470.880854][T25136] Dev loop5: unable to read RDB block 15 [ 470.904367][T25136] loop5: unable to read partition table [ 470.941170][T25136] loop5: partition table beyond EOD, truncated [ 471.001562][T25136] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 471.010416][T25169] loop1: detected capacity change from 0 to 1051 [ 471.103693][T25169] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 471.169687][T25169] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 471.208355][T25169] EXT4-fs (loop1): get root inode failed [ 471.216823][T25169] EXT4-fs (loop1): mount failed 02:46:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) read(0xffffffffffffffff, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:09 executing program 2: r0 = gettid() prlimit64(r0, 0x0, &(0x7f0000000040)={0x80000000005}, 0x0) 02:46:09 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:09 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x0, @time, 0x0, {}, 0x0, 0x0, 0x20}) write$sndseq(r0, &(0x7f0000000000)=[{0x1e, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x0, 0x0}}], 0xfd63) 02:46:09 executing program 5: r0 = shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x4000) shmdt(r0) madvise(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x0) 02:46:09 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 471.643709][T25187] loop1: detected capacity change from 0 to 1051 02:46:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000001"], 0x14}}, 0x0) 02:46:09 executing program 5: clock_gettime(0x0, &(0x7f0000000200)={0x0}) pselect6(0x0, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, &(0x7f0000000240)={r0}, &(0x7f00000002c0)={&(0x7f0000000280)={[0x1]}, 0x8}) 02:46:09 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 471.738196][T25187] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 02:46:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) read(0xffffffffffffffff, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 471.840465][T25187] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated 02:46:10 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000040)={'wpan3\x00'}) [ 471.960337][T25187] EXT4-fs (loop1): get root inode failed [ 471.966021][T25187] EXT4-fs (loop1): mount failed 02:46:10 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:10 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:10 executing program 2: syz_open_dev$vcsa(&(0x7f0000000980), 0x0, 0x0) fork() 02:46:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) read(0xffffffffffffffff, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:10 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xb, &(0x7f0000000000)=0x80000001, 0x4) [ 472.218284][T25213] loop4: detected capacity change from 0 to 69632 02:46:10 executing program 2: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x2}, 0x0, &(0x7f00000000c0)={0x0, 0x2710}) [ 472.274010][T25218] loop1: detected capacity change from 0 to 1051 [ 472.290552][T25213] EXT4-fs error (device loop4): ext4_fill_super:4953: inode #2: comm syz-executor.4: iget: root inode unallocated [ 472.305457][T25218] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 472.315588][T25213] EXT4-fs (loop4): get root inode failed 02:46:10 executing program 0: r0 = shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x4000) shmat(0x0, &(0x7f0000ff8000/0x3000)=nil, 0x7000) shmdt(r0) [ 472.346985][T25213] EXT4-fs (loop4): mount failed [ 472.355292][T25218] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 472.381225][T25218] EXT4-fs (loop1): get root inode failed 02:46:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r1, &(0x7f0000000a40)=""/102400, 0x19000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 472.418006][T25218] EXT4-fs (loop1): mount failed 02:46:10 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f00000004c0)=[{0x0}, {0x0, 0x0, 0x3e4}]) 02:46:10 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:10 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00), 0x0, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:10 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af3010004000000000000000000010009", 0x29, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 02:46:10 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0x20402) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000180)={0x0, 0x0, 0x8, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000380)="7b27f400aac5ae6c", 0x0, 0x0, 0x0, 0x0, 0x0}) write$binfmt_aout(r0, &(0x7f0000000380)=ANY=[], 0x342) [ 472.931258][T25248] loop4: detected capacity change from 0 to 69632 [ 472.939980][T25249] loop2: detected capacity change from 0 to 69632 [ 472.955486][T25253] loop5: detected capacity change from 0 to 3 [ 472.963574][T25248] EXT4-fs error (device loop4): ext4_fill_super:4953: inode #2: comm syz-executor.4: iget: root inode unallocated [ 472.970948][T25247] loop1: detected capacity change from 0 to 1051 [ 472.979254][T25248] EXT4-fs (loop4): get root inode failed [ 472.987720][T25248] EXT4-fs (loop4): mount failed [ 473.002106][T25254] sg_write: data in/out 1823393158/792 bytes for SCSI command 0x0-- guessing data in; [ 473.002106][T25254] program syz-executor.0 not setting count and/or reply_len properly [ 473.009370][T25253] Dev loop5: unable to read RDB block 3 [ 473.044958][T25249] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 473.059981][T25263] sg_write: data in/out 1823393158/792 bytes for SCSI command 0x0-- guessing data in; [ 473.059981][T25263] program syz-executor.0 not setting count and/or reply_len properly 02:46:11 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:11 executing program 0: socketpair(0xa, 0x1, 0x0, &(0x7f00000011c0)) [ 473.105565][T25253] loop5: unable to read partition table [ 473.111861][T25247] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 02:46:11 executing program 0: syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) fork() syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) 02:46:11 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 473.204443][T25253] loop5: partition table beyond EOD, truncated [ 473.217307][T25247] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 473.235104][T25253] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 473.259316][T25247] EXT4-fs (loop1): get root inode failed [ 473.275454][T25247] EXT4-fs (loop1): mount failed [ 473.283448][T25274] loop4: detected capacity change from 0 to 69632 [ 473.316432][T25253] loop5: detected capacity change from 0 to 3 [ 473.319063][T25274] EXT4-fs error (device loop4): ext4_fill_super:4953: inode #2: comm syz-executor.4: iget: root inode unallocated 02:46:11 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000007c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4, 0x8}]}]}, 0x1c}}, 0x0) [ 473.370737][T25274] EXT4-fs (loop4): get root inode failed [ 473.373681][T25253] Dev loop5: unable to read RDB block 3 [ 473.383504][T25278] loop2: detected capacity change from 0 to 69632 [ 473.385107][T25274] EXT4-fs (loop4): mount failed [ 473.406490][T25253] loop5: unable to read partition table [ 473.413805][T25278] EXT4-fs: failed to create workqueue 02:46:11 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00), 0x0, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 473.419692][T25278] EXT4-fs (loop2): mount failed 02:46:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r1, &(0x7f0000000a40)=""/102400, 0x19000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 473.493639][T25253] loop5: partition table beyond EOD, truncated [ 473.512623][T25253] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 473.582121][T25303] loop1: detected capacity change from 0 to 1051 02:46:11 executing program 5: semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000180)=""/82) 02:46:11 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000200000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000080)) 02:46:11 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:11 executing program 0: socketpair(0x2, 0x5, 0x63, &(0x7f0000000000)) [ 473.623946][T25303] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 473.635754][T25303] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 473.653788][T25303] EXT4-fs (loop1): get root inode failed [ 473.660424][T25303] EXT4-fs (loop1): mount failed [ 473.699945][T25316] loop2: detected capacity change from 0 to 4 [ 473.704882][T25315] loop4: detected capacity change from 0 to 69632 [ 473.732617][T25316] EXT4-fs (loop2): can't read group descriptor 0 02:46:11 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00), 0x0, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 473.755680][T25315] EXT4-fs error (device loop4): ext4_fill_super:4953: inode #2: comm syz-executor.4: iget: root inode unallocated [ 473.794044][T25315] EXT4-fs (loop4): get root inode failed 02:46:11 executing program 5: r0 = gettid() r1 = getpgrp(0x0) rt_tgsigqueueinfo(r1, r0, 0x0, &(0x7f0000000000)) [ 473.812062][T25316] loop2: detected capacity change from 0 to 4 [ 473.869687][T25315] EXT4-fs (loop4): mount failed [ 473.878096][T25332] loop1: detected capacity change from 0 to 1051 [ 473.885165][T25316] EXT4-fs (loop2): can't read group descriptor 0 02:46:12 executing program 2: r0 = getpgrp(0x0) waitid(0x3, r0, 0x0, 0x2, 0x0) [ 473.935478][T25332] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 02:46:12 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:12 executing program 0: semtimedop(0x0, &(0x7f0000000200)=[{}, {}], 0x2, &(0x7f0000000240)={0x0, 0x3938700}) [ 473.979041][T25332] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 474.014645][T25332] EXT4-fs (loop1): get root inode failed 02:46:12 executing program 5: syz_open_dev$vcsa(&(0x7f0000000000), 0xb28, 0x4000) [ 474.028198][T25332] EXT4-fs (loop1): mount failed [ 474.085471][T25356] loop4: detected capacity change from 0 to 69632 02:46:12 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf465", 0xf, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 474.158419][T25356] EXT4-fs error (device loop4): ext4_fill_super:4953: inode #2: comm syz-executor.4: iget: root inode unallocated [ 474.197285][T25356] EXT4-fs (loop4): get root inode failed [ 474.204002][T25356] EXT4-fs (loop4): mount failed [ 474.247800][T25367] loop1: detected capacity change from 0 to 1051 [ 474.258219][T25367] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 474.281459][T25367] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 474.324122][T25367] EXT4-fs (loop1): get root inode failed [ 474.331134][T25367] EXT4-fs (loop1): mount failed 02:46:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r1, &(0x7f0000000a40)=""/102400, 0x19000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:12 executing program 0: semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000000)=""/184) 02:46:12 executing program 2: clone3(&(0x7f0000000b80)={0x1a921100, 0x0, 0x0, &(0x7f00000005c0), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 02:46:12 executing program 5: fork() setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, 0x0, &(0x7f0000000280)) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x0) r0 = getpgrp(0x0) getpgrp(r0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, 0x0) sendmsg$NL80211_CMD_SET_BEACON(0xffffffffffffffff, &(0x7f0000000fc0)={0x0, 0x0, 0x0}, 0x0) sendmsg$NL802154_CMD_NEW_SEC_DEV(0xffffffffffffffff, &(0x7f00000010c0)={0x0, 0x0, 0x0}, 0x0) 02:46:12 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {0x0, 0x0, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:12 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf465", 0xf, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 474.585737][T25386] loop1: detected capacity change from 0 to 1051 [ 474.592826][T25383] loop4: detected capacity change from 0 to 69632 02:46:12 executing program 2: syz_open_dev$vcsa(&(0x7f0000000340), 0x0, 0x1c94c0) 02:46:12 executing program 0: memfd_create(&(0x7f0000000000)='(,),$\x00', 0x4) 02:46:12 executing program 5: semtimedop(0x0, &(0x7f0000000500)=[{0x0, 0x0, 0x1000}], 0x1, 0x0) [ 474.697503][T25383] EXT4-fs error (device loop4): ext4_fill_super:4953: inode #2: comm syz-executor.4: iget: root inode unallocated [ 474.713772][T25386] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 02:46:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_EEE_HEADER={0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0xa, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_EEE_MODES_OURS={0xe44, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x1ac, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '@\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '!\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ']%/\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0xc8d, 0x5, "8d3fb627360601a19ba65fec179c763b6593d613d47b63558aa003edee3b16d8afa2456a04c69407459aae29adeec3afcddc1d6a1cc13c05818165386ece361ffa31d4a097b67d65280469f147db13f45bf57432849f1d3d4c591f8c55ea99eb5a5aaac29c99fbf9938fa72851f4f2dbd8165a3efd2cc5d0b1de6dc49b580f10e7fc7486f8ae16bfad348b13fa8af09727cdd1243f202de3761f2c648f7a1986f91ca092593dd86a91157e1b39737954bebe8973ba58348605c711f9bc9da5b7a7a0a4882e1b646356759036ea20c52448822dd28452079369e8a8814b238c7807f7558f73dabf0d6b8312264ca44436a07c0da82f1779ae27cf65d884e025148f3e1bffe92bceb3027230cf30b02a58742b4522e2610240c2a9df61d03b90c4b320f737951477c177f27c406abf12140a9ff042663fcd1c29d4a1cb703e023669846527d11e06f2801bbe2920576335d3df2e570e5fc3c59c1c02e5e2a50b0037348acf78084af5817bee63609ec690f3739c5b2df4f884f6dd83a8d12d9710579d3d60df74cd6b9579f719339ab79454221253905848f1ccb45f1207dc8e7253695eb93f9a69e22ec261fab2b3d773f568d94772dc1a76d4df5a5ed26ca996360f41c3859ad6e6de85a05be0259abc60be3b7cd2dac0fd463f70e35b52ef68b5cec42939e66d4d48b716f43920b51c15f631e746b760f8124c4dbb5f54c6a1a566e1e09ca65c2f5acca756de1b96003701bb94eecc8e099f5ef05b22656c9fd14c942edd74777a32ab87923cc0cbb30e7b298a5dff7d7c760337c822be1c3fc5289e2b6d6ba148ccde865f926943b17c0ba056ad9794d4a8e4bab0a41345f0748907655e10015e6cfc09198159e070940d485f4adb5dd5958568dd9f7777753238dda122c1fc3d1ea506309794dc65ed74085a221b794fedfbb165e869bab2c629c3a90a0ebe71f536a5a7ed1ad1ea68c89ce2595dd8b63c4d4fb6e44c9e31ce9f2b75e06dd6ae067b08ab53c54882ad914d3eef4a6a87c44b493bb3ef3582b9d445332be8996d31d1536b6e4be9163587f3044966c9e36d741ca66f53a6af38b6898b241e22f10d9067872ed9a9855f2fd99b38d12c61f76cc664f483d33ea0db8aeaaf522fe57e2f95db7be889b521fe1e1981e408e163db2dd3b5c839d3ab640a9c641c0de8008929846d67f4bdbcd3d0cd42e719c81731b60a40b87ed3f0970b89817c4a9647d8b3eb60ce6bb91bbaabeac66051c3074b5eda54121e93908b45dd74c29dd5c711c5d29cb18b8114237b44e0f0de2511bf70776f99ca45ea539cda78280efa6aac24d1bc4b9f8d91f481d209cdd45b8ef81b884cf91b081ff39714eba3525a312ab1af55aadc92a56bfb586ad8f1cd8b8923d9d9ebd69f1febf12cb2bcb6ff01bc647dd66b848aa5cb28d68c74da662291e35a48fdbe3d809440339eb349f7a6ce6fcf5a46c79b1712fdfb673f95f6d168ee3af3d870e094a1f25f350eb70be797c7a78a8f4033fddb585dc470507624ef13f02d6a503f83e6285800ee3250987acf67f36be54fcadc4b5154c5151f344d4489d9340999239db46d749e177495bf889426d6b8b5d4ac2cf9550f85eaf43833d650cd6d3d05b0e8885e3edb836f8fdd9a9b20c52c0fba16a2ddf13f14d8ffdae890b8f051a9b34ee8af8239aa03971f03e1b24a46518aa94a710cfdb6de255cc9e4013b13169959dfe20a2b405798119de22d6aaf166753e2f04978e7df9a075027cc1f0fcb830c1e1a6616107292baba6db550c314274514482c0ca3fab2224ce7911d4bb4687532e44ae5d09cc738d17519e727061c779a90776a8545f684531bf878953b4287de683eed9b72d91442ff3b5a1d71e2dfe1aaa0967c5631d37b97c011f908420e83465ede8148775a813c178186c677ea72bfcad29fc5b5203fba9a1a1d0553676f7077b723af9cd4736382b969c8fd39ec3ea0000ee15b247c18f91558915f96dc4c85f504198913afbeda828f3b24c96a6c661f3e5e9c629363d5f370901a577abfeada3f9e0183474f8576ac257a8091cfc94a51dcbaa25fbb5f853bde5d142ac6bca2448e9211bd9750bb57cec1831f4033ce338bb57266af00c0fb3b5b45c8a58e1e40f9a46ca402b24d343246c8ed0ef88c27d0e309295338fb3a17b002bd3c5626764f1f84de98861eaf3f363b7fffb8a574c8b75085cb9122071b9e31623de3d19cb0f6a6d9fdf78b1e00369bf1b75a0b782496b2ed2dd6db7908630f929e60a09738bbaeaae61c4bb6c530189bf720c400132bd2a27efa55011a07aa892508c2796e34847b858136322f034ecfae056e888c9ed6c84bd3624e0abb5d6ffbf6abe8a6a803af0b582c1233e9bc5a4d9cfc1af32d79411a0f1a0675647cca589eb7b7b92e0356fe4824bd4ddc6cab3fd5090f8de38b5c7b581f994ad9e7f530e63edf10644fc83673145ae70b566a3a4ba6977cc268628a048dc107b74ae15e1cb73dc269500e86752cd0b552fe23b9e4a2f640d48cfd5cf303f7e7812e776f47a390bfefe6eadc9e7e4dc5c0fa73c9390d059cace969e0d499354899161d8a2bf8fd0cd95432b23541396f6f8021abb6cbb136b847cda61c0656a10d54b558cd6a7d0adf5020a37d99efa14d7757beaa049b4a5b08953b0467001f3a62fde5ddf161c84cfd48bc66225b1e92a13b00908e076ff387a073fe177175b7e2b70d9ca1e061a0e0d604a5f0d430e99c070f9272021979239a6f1d513454426d02b92b1e44924eafb6599c95e17d60d63b942b3e7d6dda6dbef019662a11b44bdc23f6f8b9ab6256eedf35c2e79783c6269630f51f3b35e067c14bcba6b97de7a2ef2f50c0219072263c0d94c9e5d121b6487d5b15da24fcb3e37ae6bdea0dccbe0d942440f8c31bdc82d2a028716812fe41b9987f4a624fa14961d95daad9ebc12f6c7e9c97ad6980b99c2b68f7cbb95651585e84b27f40033273317c95b43726b0caf7c455a25c497ff351399c6afa63aee4f53a611408a4589eb8b1a0a30ab3aee42054bace3aa01c5ab4a7365aba62b68b51b91918d1c8d9df6e3ef94ff4df1ed22c3efe15cc8597ff1c17a810a999111914c576148e0dacdf1ff837407c3a68af2aabbec8240ab7bbd317656ddd64237e2c317064f12db1ae9eb0e828e9fc4456a4acb1f155f33f274c962d5f84fae2917f8458822aa1c14184cca3f4f2c11c42199bc73fe4ecc0ee5eff8f76d8343fec4a43ed9bd18c355713092d629c7a5500351443dd7bfbfc0738339956b90c9317a3b12483209735a16cea02595e42e47f99a9e49a2a86155ebcc1680043250dd604fa5fff0ff485465e331f41ad1772089621ed038dc6785f43e7ce93d7f10a52c03798e2a0b93d83eb39bacbe16aaa5174b52a47fee443d7eb7d719b17d4edbce9bc00a3381a75b68ffc404c78448eaf885e936d4a84fe1a18ddad7a71a095e98362f645e273a19e55be25fcc601677c971fa4c734318b46cfc046ae983ae46c4a7406c75e5f0f1ebbf252c86bc34114dff47e6dadad94d30abc428a63ea8cd25e139f3992c9f25698c14d0f1692968371e12538582f47b215b4b63ffc02548f453215ebda53091223b342fd7891605d30dc929c512a29cb389169039d30a5937da2eeb19b6c14623149e8e533dc038bd14e137a72ffcdf789046dc87ff473da9ed5dec401ecd2e105763f4fa333555d96258bd1264c01190f440541f7f694cd1e7046e9b770415e1c2df49b51e5852f93b9fab4be238cddac5ca2ccc9232343d1bf177ae948461d3496575c5c46416b59816a6a24f1b7a11e86c8f9a3c99ded333bddd3717df72f97ad91e5a0216a8daed905528e6266f3d7f1281f6074e65db7f833ad6b8dd043f770645162471f05c0054340687ab9c3c5f24d0c2b224f93cef80d5036868d0212040c376a81bdb9105c296cbe2ac80e6e41d2f7a928abab49e8f5b346040f66ab4cf5327964b17e3a03fa39f5910fdc29882120619c0f8c8ea04083ca02d9c77b21b95300e2874a3f2f9443a4db9361f85fa96cdf166d821029d03e1c344051c42cf960899c368c756614c2b1c1db30e094ec1884e21f9fa184c05c5e5ca315233ca6a1bb4df7cae2614dc1e5b3787992b684ada8e4fc28e1b73d1b4cf4c4f9c8aeb6000faea2bdecb5594200ffa602de9c969b826a1d4566b880795ea93715d43ec8761116d2330e213e6b9aeadd3a17664169d6ab742bc447bba50ccce6512c91bc0a890ac65b12e1403292af64bcc1680c7b254f0309c2c1a97b5bdd3049c0063fc551b9d1d7f1626658d435a1a5e0bf7e7ed8ff6b401b07a10cdf60c81dcd933e98f910a442cbeeaf2ae5d14ade27f1fb8d6c5ed1fcf341cb589804afcacf7b518ce3a3b0ef810c0eee305fd6e383beab1c3e8cb4e65ede69260d97312c22466ec0ff7699df633562296d64e656067a6bf562dd2b7bbf8a51ef16bad4fee3229265a9e53f507b332011878727dba68d4044d261e0746cd113e92df915aac37a9bb789ab70ce76f532"}, @ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0xec4}}, 0x0) [ 474.787143][T25383] EXT4-fs (loop4): get root inode failed [ 474.802178][T25386] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 474.831030][T25383] EXT4-fs (loop4): mount failed [ 474.853034][T25386] EXT4-fs (loop1): get root inode failed 02:46:12 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680), 0x0, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 474.899022][T25386] EXT4-fs (loop1): mount failed 02:46:13 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf465", 0xf, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 475.021236][T25413] loop4: detected capacity change from 0 to 69632 [ 475.051458][T25418] loop1: detected capacity change from 0 to 1051 [ 475.063242][T25418] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 475.067470][T25413] EXT4-fs error (device loop4): ext4_fill_super:4953: inode #2: comm syz-executor.4: iget: root inode unallocated [ 475.092123][T25413] EXT4-fs (loop4): get root inode failed [ 475.102596][T25418] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 475.116691][T25413] EXT4-fs (loop4): mount failed [ 475.126029][T25418] EXT4-fs (loop1): get root inode failed [ 475.133903][T25418] EXT4-fs (loop1): mount failed 02:46:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:13 executing program 0: r0 = getpgrp(0x0) prlimit64(r0, 0x9, &(0x7f00000003c0), &(0x7f00000014c0)) 02:46:13 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_EEE_HEADER={0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_EEE_MODES_OURS={0xe44, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x1ac, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '@\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '!\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ']%/\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0xc8d, 0x5, "8d3fb627360601a19ba65fec179c763b6593d613d47b63558aa003edee3b16d8afa2456a04c69407459aae29adeec3afcddc1d6a1cc13c05818165386ece361ffa31d4a097b67d65280469f147db13f45bf57432849f1d3d4c591f8c55ea99eb5a5aaac29c99fbf9938fa72851f4f2dbd8165a3efd2cc5d0b1de6dc49b580f10e7fc7486f8ae16bfad348b13fa8af09727cdd1243f202de3761f2c648f7a1986f91ca092593dd86a91157e1b39737954bebe8973ba58348605c711f9bc9da5b7a7a0a4882e1b646356759036ea20c52448822dd28452079369e8a8814b238c7807f7558f73dabf0d6b8312264ca44436a07c0da82f1779ae27cf65d884e025148f3e1bffe92bceb3027230cf30b02a58742b4522e2610240c2a9df61d03b90c4b320f737951477c177f27c406abf12140a9ff042663fcd1c29d4a1cb703e023669846527d11e06f2801bbe2920576335d3df2e570e5fc3c59c1c02e5e2a50b0037348acf78084af5817bee63609ec690f3739c5b2df4f884f6dd83a8d12d9710579d3d60df74cd6b9579f719339ab79454221253905848f1ccb45f1207dc8e7253695eb93f9a69e22ec261fab2b3d773f568d94772dc1a76d4df5a5ed26ca996360f41c3859ad6e6de85a05be0259abc60be3b7cd2dac0fd463f70e35b52ef68b5cec42939e66d4d48b716f43920b51c15f631e746b760f8124c4dbb5f54c6a1a566e1e09ca65c2f5acca756de1b96003701bb94eecc8e099f5ef05b22656c9fd14c942edd74777a32ab87923cc0cbb30e7b298a5dff7d7c760337c822be1c3fc5289e2b6d6ba148ccde865f926943b17c0ba056ad9794d4a8e4bab0a41345f0748907655e10015e6cfc09198159e070940d485f4adb5dd5958568dd9f7777753238dda122c1fc3d1ea506309794dc65ed74085a221b794fedfbb165e869bab2c629c3a90a0ebe71f536a5a7ed1ad1ea68c89ce2595dd8b63c4d4fb6e44c9e31ce9f2b75e06dd6ae067b08ab53c54882ad914d3eef4a6a87c44b493bb3ef3582b9d445332be8996d31d1536b6e4be9163587f3044966c9e36d741ca66f53a6af38b6898b241e22f10d9067872ed9a9855f2fd99b38d12c61f76cc664f483d33ea0db8aeaaf522fe57e2f95db7be889b521fe1e1981e408e163db2dd3b5c839d3ab640a9c641c0de8008929846d67f4bdbcd3d0cd42e719c81731b60a40b87ed3f0970b89817c4a9647d8b3eb60ce6bb91bbaabeac66051c3074b5eda54121e93908b45dd74c29dd5c711c5d29cb18b8114237b44e0f0de2511bf70776f99ca45ea539cda78280efa6aac24d1bc4b9f8d91f481d209cdd45b8ef81b884cf91b081ff39714eba3525a312ab1af55aadc92a56bfb586ad8f1cd8b8923d9d9ebd69f1febf12cb2bcb6ff01bc647dd66b848aa5cb28d68c74da662291e35a48fdbe3d809440339eb349f7a6ce6fcf5a46c79b1712fdfb673f95f6d168ee3af3d870e094a1f25f350eb70be797c7a78a8f4033fddb585dc470507624ef13f02d6a503f83e6285800ee3250987acf67f36be54fcadc4b5154c5151f344d4489d9340999239db46d749e177495bf889426d6b8b5d4ac2cf9550f85eaf43833d650cd6d3d05b0e8885e3edb836f8fdd9a9b20c52c0fba16a2ddf13f14d8ffdae890b8f051a9b34ee8af8239aa03971f03e1b24a46518aa94a710cfdb6de255cc9e4013b13169959dfe20a2b405798119de22d6aaf166753e2f04978e7df9a075027cc1f0fcb830c1e1a6616107292baba6db550c314274514482c0ca3fab2224ce7911d4bb4687532e44ae5d09cc738d17519e727061c779a90776a8545f684531bf878953b4287de683eed9b72d91442ff3b5a1d71e2dfe1aaa0967c5631d37b97c011f908420e83465ede8148775a813c178186c677ea72bfcad29fc5b5203fba9a1a1d0553676f7077b723af9cd4736382b969c8fd39ec3ea0000ee15b247c18f91558915f96dc4c85f504198913afbeda828f3b24c96a6c661f3e5e9c629363d5f370901a577abfeada3f9e0183474f8576ac257a8091cfc94a51dcbaa25fbb5f853bde5d142ac6bca2448e9211bd9750bb57cec1831f4033ce338bb57266af00c0fb3b5b45c8a58e1e40f9a46ca402b24d343246c8ed0ef88c27d0e309295338fb3a17b002bd3c5626764f1f84de98861eaf3f363b7fffb8a574c8b75085cb9122071b9e31623de3d19cb0f6a6d9fdf78b1e00369bf1b75a0b782496b2ed2dd6db7908630f929e60a09738bbaeaae61c4bb6c530189bf720c400132bd2a27efa55011a07aa892508c2796e34847b858136322f034ecfae056e888c9ed6c84bd3624e0abb5d6ffbf6abe8a6a803af0b582c1233e9bc5a4d9cfc1af32d79411a0f1a0675647cca589eb7b7b92e0356fe4824bd4ddc6cab3fd5090f8de38b5c7b581f994ad9e7f530e63edf10644fc83673145ae70b566a3a4ba6977cc268628a048dc107b74ae15e1cb73dc269500e86752cd0b552fe23b9e4a2f640d48cfd5cf303f7e7812e776f47a390bfefe6eadc9e7e4dc5c0fa73c9390d059cace969e0d499354899161d8a2bf8fd0cd95432b23541396f6f8021abb6cbb136b847cda61c0656a10d54b558cd6a7d0adf5020a37d99efa14d7757beaa049b4a5b08953b0467001f3a62fde5ddf161c84cfd48bc66225b1e92a13b00908e076ff387a073fe177175b7e2b70d9ca1e061a0e0d604a5f0d430e99c070f9272021979239a6f1d513454426d02b92b1e44924eafb6599c95e17d60d63b942b3e7d6dda6dbef019662a11b44bdc23f6f8b9ab6256eedf35c2e79783c6269630f51f3b35e067c14bcba6b97de7a2ef2f50c0219072263c0d94c9e5d121b6487d5b15da24fcb3e37ae6bdea0dccbe0d942440f8c31bdc82d2a028716812fe41b9987f4a624fa14961d95daad9ebc12f6c7e9c97ad6980b99c2b68f7cbb95651585e84b27f40033273317c95b43726b0caf7c455a25c497ff351399c6afa63aee4f53a611408a4589eb8b1a0a30ab3aee42054bace3aa01c5ab4a7365aba62b68b51b91918d1c8d9df6e3ef94ff4df1ed22c3efe15cc8597ff1c17a810a999111914c576148e0dacdf1ff837407c3a68af2aabbec8240ab7bbd317656ddd64237e2c317064f12db1ae9eb0e828e9fc4456a4acb1f155f33f274c962d5f84fae2917f8458822aa1c14184cca3f4f2c11c42199bc73fe4ecc0ee5eff8f76d8343fec4a43ed9bd18c355713092d629c7a5500351443dd7bfbfc0738339956b90c9317a3b12483209735a16cea02595e42e47f99a9e49a2a86155ebcc1680043250dd604fa5fff0ff485465e331f41ad1772089621ed038dc6785f43e7ce93d7f10a52c03798e2a0b93d83eb39bacbe16aaa5174b52a47fee443d7eb7d719b17d4edbce9bc00a3381a75b68ffc404c78448eaf885e936d4a84fe1a18ddad7a71a095e98362f645e273a19e55be25fcc601677c971fa4c734318b46cfc046ae983ae46c4a7406c75e5f0f1ebbf252c86bc34114dff47e6dadad94d30abc428a63ea8cd25e139f3992c9f25698c14d0f1692968371e12538582f47b215b4b63ffc02548f453215ebda53091223b342fd7891605d30dc929c512a29cb389169039d30a5937da2eeb19b6c14623149e8e533dc038bd14e137a72ffcdf789046dc87ff473da9ed5dec401ecd2e105763f4fa333555d96258bd1264c01190f440541f7f694cd1e7046e9b770415e1c2df49b51e5852f93b9fab4be238cddac5ca2ccc9232343d1bf177ae948461d3496575c5c46416b59816a6a24f1b7a11e86c8f9a3c99ded333bddd3717df72f97ad91e5a0216a8daed905528e6266f3d7f1281f6074e65db7f833ad6b8dd043f770645162471f05c0054340687ab9c3c5f24d0c2b224f93cef80d5036868d0212040c376a81bdb9105c296cbe2ac80e6e41d2f7a928abab49e8f5b346040f66ab4cf5327964b17e3a03fa39f5910fdc29882120619c0f8c8ea04083ca02d9c77b21b95300e2874a3f2f9443a4db9361f85fa96cdf166d821029d03e1c344051c42cf960899c368c756614c2b1c1db30e094ec1884e21f9fa184c05c5e5ca315233ca6a1bb4df7cae2614dc1e5b3787992b684ada8e4fc28e1b73d1b4cf4c4f9c8aeb6000faea2bdecb5594200ffa602de9c969b826a1d4566b880795ea93715d43ec8761116d2330e213e6b9aeadd3a17664169d6ab742bc447bba50ccce6512c91bc0a890ac65b12e1403292af64bcc1680c7b254f0309c2c1a97b5bdd3049c0063fc551b9d1d7f1626658d435a1a5e0bf7e7ed8ff6b401b07a10cdf60c81dcd933e98f910a442cbeeaf2ae5d14ade27f1fb8d6c5ed1fcf341cb589804afcacf7b518ce3a3b0ef810c0eee305fd6e383beab1c3e8cb4e65ede69260d97312c22466ec0ff7699df633562296d64e656067a6bf562dd2b7bbf8a51ef16bad4fee3229265a9e53f507b332011878727dba68d4044d261e0746cd113e92df915aac37a9bb789ab70ce76f532"}, @ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0xec4}}, 0x0) 02:46:13 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000a00)={'ip6gre0\x00', 0x0}) 02:46:13 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680), 0x0, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:13 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000", 0x16, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 475.547978][T25437] loop4: detected capacity change from 0 to 69632 [ 475.567894][T25438] loop1: detected capacity change from 0 to 1051 02:46:13 executing program 2: set_mempolicy(0x1, &(0x7f00000001c0)=0x7f, 0xbb) r0 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000000c0)=@dstopts, 0x8) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000100000000000000000000000000000205", 0x18) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @private0}, 0x1c) writev(r0, &(0x7f0000000000)=[{&(0x7f00000003c0)='Z', 0x1}], 0x1) 02:46:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000700), r0) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000840)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000800)={0x0}}, 0x0) 02:46:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) accept4(r0, 0x0, 0x0, 0x100000) [ 475.626273][T25438] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 475.643779][T25437] EXT4-fs error (device loop4): ext4_fill_super:4953: inode #2: comm syz-executor.4: iget: root inode unallocated [ 475.665229][T25437] EXT4-fs (loop4): get root inode failed [ 475.672992][T25437] EXT4-fs (loop4): mount failed 02:46:13 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, &(0x7f0000002580)={"b71a9ce3700c45b73d5d7821db7b3a96"}) 02:46:13 executing program 5: syz_open_dev$vcsa(&(0x7f0000000000), 0x8, 0x240080) 02:46:13 executing program 0: syz_genetlink_get_family_id$nl80211(&(0x7f0000000b40), 0xffffffffffffffff) [ 475.702093][T25438] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated 02:46:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 475.745708][T25438] EXT4-fs (loop1): get root inode failed 02:46:13 executing program 5: socketpair(0x5, 0x0, 0x0, &(0x7f0000001200)) [ 475.798854][T25438] EXT4-fs (loop1): mount failed 02:46:13 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680), 0x0, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:13 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f00000017c0), 0x0, 0x3a35c0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 02:46:13 executing program 0: r0 = memfd_create(&(0x7f0000000100)='%$\\-^)/\\\x00', 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, 0x0) 02:46:14 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000", 0x16, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r0, &(0x7f0000000540)={&(0x7f0000000480), 0x2, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 02:46:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000800)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_EEE_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_EEE_MODES_OURS={0xe44, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x1ac, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '@\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '!\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ']%/\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000001}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0xc91, 0x5, "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"}]}]}, 0xec4}}, 0x0) 02:46:14 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000000c0)) [ 475.985268][T25481] loop4: detected capacity change from 0 to 69632 [ 476.014977][T25487] loop1: detected capacity change from 0 to 1051 [ 476.022522][T25481] EXT4-fs error (device loop4): ext4_fill_super:4953: inode #2: comm syz-executor.4: iget: root inode unallocated 02:46:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 476.062890][T25487] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 476.093425][T25481] EXT4-fs (loop4): get root inode failed 02:46:14 executing program 5: syz_open_dev$vcsa(&(0x7f00000000c0), 0x0, 0x4440) [ 476.121834][T25481] EXT4-fs (loop4): mount failed 02:46:14 executing program 2: memfd_create(0x0, 0x9) [ 476.153415][T25487] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated 02:46:14 executing program 0: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x82) 02:46:14 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000", 0x17, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:14 executing program 2: clock_gettime(0x0, &(0x7f0000000140)={0x0}) pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0x2}, &(0x7f0000000100)={0x5}, &(0x7f0000000180)={r0}, 0x0) [ 476.235611][T25487] EXT4-fs (loop1): get root inode failed [ 476.266008][T25487] EXT4-fs (loop1): mount failed 02:46:14 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000300), 0x0, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x0, 0x0, 0x0) 02:46:14 executing program 5: socketpair(0x10, 0x0, 0x5, &(0x7f0000001200)) [ 476.313328][T25512] loop4: detected capacity change from 0 to 69632 02:46:14 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000", 0x16, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:14 executing program 2: clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, r0+10000000}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) 02:46:14 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) clock_gettime(0x0, &(0x7f0000002b80)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000002b00)=[{{0x0, 0x0, &(0x7f0000002300)=[{&(0x7f0000000b80)=""/1, 0x1}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000e80)=""/89, 0x59}, {0x0}, {0x0}, {0x0}, {&(0x7f0000002200)=""/216, 0xd8}], 0x9, &(0x7f00000023c0)=""/147, 0x93}}], 0x1, 0x2101, &(0x7f0000002bc0)={0x0, r1+60000000}) [ 476.413371][T25512] EXT4-fs error (device loop4): ext4_fill_super:4953: inode #2: comm syz-executor.4: iget: root inode unallocated [ 476.443475][T25512] EXT4-fs (loop4): get root inode failed [ 476.450490][T25512] EXT4-fs (loop4): mount failed 02:46:14 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000004c80)) [ 476.466754][T25529] loop1: detected capacity change from 0 to 1051 [ 476.482510][T25529] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 02:46:14 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000", 0x17, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 476.521349][T25529] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated 02:46:14 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011500)="ed41000000080000daf4655fdbf4655fdbf4655f000000000000040040", 0x1d, 0x2100}, {&(0x7f0000012800)="504d4d00504d4dff", 0x8, 0x20000}], 0x0, &(0x7f0000012e00)) 02:46:14 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) [ 476.566911][T25544] loop4: detected capacity change from 0 to 69632 [ 476.580811][T25529] EXT4-fs (loop1): get root inode failed [ 476.586685][T25529] EXT4-fs (loop1): mount failed 02:46:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 476.618366][T25544] EXT4-fs error (device loop4): ext4_fill_super:4953: inode #2: comm syz-executor.4: iget: root inode unallocated 02:46:14 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000", 0x1a, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000800)={0xff0, r1, 0xf01, 0x0, 0x0, {}, [@ETHTOOL_A_EEE_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_EEE_MODES_OURS={0xf70, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x1ac, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '@\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '!\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ']%/\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0xdbd, 0x5, "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"}]}]}, 0xff0}}, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000140), r0) [ 476.677200][T25544] EXT4-fs (loop4): get root inode failed [ 476.706933][T25544] EXT4-fs (loop4): mount failed [ 476.774387][T25559] loop5: detected capacity change from 0 to 2048 [ 477.169320][T25559] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 477.208404][T25574] loop1: detected capacity change from 0 to 1051 02:46:15 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000", 0x17, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:15 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000000980)=[{{&(0x7f0000000080)=@nfc, 0x80, &(0x7f00000002c0)=[{0x0}, {0x0}, {0x0}], 0x3}}], 0x1, 0x0, &(0x7f0000000a40)={0x0, 0x989680}) 02:46:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:15 executing program 0: socketpair(0x10, 0x0, 0x7, &(0x7f0000001200)) [ 477.226778][T25574] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 477.283003][T25581] loop4: detected capacity change from 0 to 69632 [ 477.293942][T25574] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 477.318874][T25581] EXT4-fs error (device loop4): ext4_fill_super:4953: inode #2: comm syz-executor.4: iget: root inode unallocated 02:46:15 executing program 0: r0 = timerfd_create(0x0, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) [ 477.337167][T25574] EXT4-fs (loop1): get root inode failed [ 477.346810][T25581] EXT4-fs (loop4): get root inode failed [ 477.352840][T25574] EXT4-fs (loop1): mount failed [ 477.362865][T25581] EXT4-fs (loop4): mount failed 02:46:15 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = io_uring_setup(0x45db, &(0x7f0000000540)) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r1, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:15 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af30100040000000000", 0x22, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:15 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e8f7d2e8feeb4bf889ba053b02420ff8010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011500)="ed41000000080000daf4655fdbf4655fdbf4655f000000000000040040", 0x1d, 0x2100}, {&(0x7f0000012800)="504d4d00504d4dff", 0x8, 0x20000}], 0x0, &(0x7f0000012e00)) 02:46:15 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000", 0x1a, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:15 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f00000004c0)=[{&(0x7f0000000000)="f8fd4d205f8b481e57", 0x9, 0xfff}, {&(0x7f0000000040)="c4d449016b38d1f64a82a67cb26cb600a83186d9215ae73e209e58ddf66ce4012db466db59244de332ca0519b2186ab423af807afc2d05f9c21d2c7ca41787daf7ebdd376786fd83b084c3ad146038e16d3e2d9b8c6b8a95e8fdbfa0ab12dd84415da27c6a8865acfc97c70b3903ba11d7c6b09d866cfb97709cc12a045b517bab787945b2403576b55b4b8b713fc8a24177661139f0153f1242bc9e6fa39f19a5dc28c0c983a52597c57b0ad197432d39b47307004702db57845da51745e1dae26339520f4f23dfdb42094e92c20af625cda8eb717abd3cea", 0xd9, 0x1}, {&(0x7f0000000140)="05ad49e0fd6a4f3b40e9398f8b287414fcb46ec67fe3532c8514db148cb06021e55a1a8bfc606a5319f8f2b171be9b2f94d250ebe67161115aa7cad21607cfd20cd2346b71c7", 0x46, 0x3e4}]) 02:46:15 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af30100040000000000", 0x22, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 477.514349][T25602] loop4: detected capacity change from 0 to 69632 [ 477.530422][T25602] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 02:46:15 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = io_uring_setup(0x45db, &(0x7f0000000540)) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r1, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 477.616033][T25611] loop0: detected capacity change from 0 to 15 [ 477.632250][T25613] loop1: detected capacity change from 0 to 1051 [ 477.652081][T25613] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 477.679107][T25611] Dev loop0: unable to read RDB block 15 [ 477.681129][T25613] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 477.684992][T25611] loop0: unable to read partition table [ 477.705840][T25613] EXT4-fs (loop1): get root inode failed [ 477.712563][T25613] EXT4-fs (loop1): mount failed [ 477.719697][T25611] loop0: partition table beyond EOD, truncated [ 477.726305][T25611] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 477.727408][T25624] loop4: detected capacity change from 0 to 69632 [ 477.764426][T25624] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 477.785515][T25611] loop0: detected capacity change from 0 to 15 [ 477.862907][T25639] loop5: detected capacity change from 0 to 2048 02:46:16 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af30100040000000000", 0x22, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:16 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x80585414, 0x0) 02:46:16 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000", 0x1a, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 478.239440][T25639] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 478.259490][T25611] Dev loop0: unable to read RDB block 15 [ 478.277928][T25611] loop0: unable to read partition table 02:46:16 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = io_uring_setup(0x45db, &(0x7f0000000540)) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r1, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:16 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40086602, 0x0) [ 478.283706][T25611] loop0: partition table beyond EOD, truncated [ 478.298763][T25611] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) [ 478.353728][T25653] loop1: detected capacity change from 0 to 1051 [ 478.364514][T25653] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 02:46:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000000c0)=0x4008fd, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f0000000040)=0xa, 0x1959cc36) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x1d, 0x0, "943d299217beaf5c81e1b8e79d20e4889797c3fd0237e95449d7f97ad216408f670826f609eec1e55c7d7ff1e651fc28adb1796ff42a4b289d8e4265b818fbf9771bab5df84a0e5a7ddb6cbd49631547"}, 0xd8) connect$inet6(r0, &(0x7f0000001240)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 478.396477][T25661] loop4: detected capacity change from 0 to 69632 [ 478.407639][T25653] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 478.420385][T25653] EXT4-fs (loop1): get root inode failed [ 478.423746][T25661] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 478.426157][T25653] EXT4-fs (loop1): mount failed 02:46:16 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$NL80211_CMD_FLUSH_PMKSA(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={0x0}}, 0x0) 02:46:16 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af30100040000000000000000000100", 0x28, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:16 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400", 0x1c, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="0103000000000000000009"], 0x14}}, 0x0) 02:46:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1, &(0x7f0000000040)=0x1, 0x4) 02:46:16 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_EEE_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_EEE_MODES_OURS={0xe44, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x1ac, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '@\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '!\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ']%/\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0xc8d, 0x5, "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"}, @ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0xec4}}, 0x0) [ 478.706181][T25688] loop1: detected capacity change from 0 to 1051 [ 478.718664][T25689] loop4: detected capacity change from 0 to 69632 02:46:16 executing program 5: r0 = semget$private(0x0, 0x3, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)) 02:46:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x10, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x24}}, 0x0) [ 478.781641][T25688] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 478.811097][T25689] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 02:46:16 executing program 2: rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 02:46:16 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af30100040000000000000000000100", 0x28, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 478.834448][T25688] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 478.850118][T25688] EXT4-fs (loop1): mount failed 02:46:16 executing program 0: r0 = gettid() r1 = getpgrp(0x0) rt_tgsigqueueinfo(r1, r0, 0xfffffffc, &(0x7f0000000080)) 02:46:17 executing program 5: socketpair(0x10, 0x0, 0x9, &(0x7f0000001200)) 02:46:17 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400", 0x1c, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:17 executing program 3: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:17 executing program 2: memfd_create(&(0x7f0000000100)='%$\\-^)/\\\x00', 0x0) [ 478.994549][T25724] loop4: detected capacity change from 0 to 69632 02:46:17 executing program 5: shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x4000) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffc000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) [ 479.099228][T25729] loop1: detected capacity change from 0 to 1051 [ 479.122347][T25724] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 02:46:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, 0x0, &(0x7f00000010c0)) [ 479.156806][T25729] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 02:46:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:17 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000a00)={'ip6gre0\x00', 0x0}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 479.310941][T25729] EXT4-fs (loop1): corrupt root inode, run e2fsck 02:46:17 executing program 5: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x40, 0x0) 02:46:17 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af30100040000000000000000000100", 0x28, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:17 executing program 0: clock_gettime(0x0, &(0x7f0000000140)={0x0}) pselect6(0x40, &(0x7f0000000080)={0x1}, &(0x7f00000000c0)={0x2}, &(0x7f0000000100)={0x5}, &(0x7f0000000180)={r0}, 0x0) [ 479.353971][T25729] EXT4-fs (loop1): mount failed 02:46:17 executing program 0: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan3\x00'}) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xcefa}) 02:46:17 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f0000000000000400", 0x1c, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:17 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 02:46:17 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 02:46:17 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001240)) [ 479.567856][T25763] loop1: detected capacity change from 0 to 1051 [ 479.574171][T25764] loop4: detected capacity change from 0 to 69632 [ 479.597189][T25763] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 02:46:17 executing program 5: memfd_create(&(0x7f0000004680)='}\x00', 0x3) [ 479.638660][T25764] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 479.655203][T25763] EXT4-fs (loop1): corrupt root inode, run e2fsck [ 479.672913][T25778] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. 02:46:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 479.696033][T25763] EXT4-fs (loop1): mount failed 02:46:17 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0x20402) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000180)={0x53, 0x0, 0x8, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000380)="7b27f400aac5ae6c", 0x0, 0x0, 0x0, 0x0, 0x0}) write$binfmt_aout(r0, &(0x7f0000000380)=ANY=[], 0x342) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, 0x0) 02:46:17 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af30100040000000000000000000100090000", 0x2b, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:17 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 02:46:18 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, 0x0, 0x0) 02:46:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 479.929112][T25789] sg_write: data in/out 1823393158/792 bytes for SCSI command 0x0-- guessing data in; [ 479.929112][T25789] program syz-executor.0 not setting count and/or reply_len properly [ 479.976713][T25793] loop1: detected capacity change from 0 to 1051 [ 479.987463][T25794] sg_write: data in/out 1823393158/792 bytes for SCSI command 0x0-- guessing data in; [ 479.987463][T25794] program syz-executor.0 not setting count and/or reply_len properly [ 480.011347][T25797] loop4: detected capacity change from 0 to 69632 02:46:18 executing program 0: socketpair(0x2, 0x1, 0x0, &(0x7f00000011c0)) [ 480.026167][T25793] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 480.043663][T25797] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 02:46:18 executing program 0: syz_open_procfs(0x0, &(0x7f0000000800)='map_files\x00') clone3(&(0x7f0000000b80)={0x1a921100, 0x0, 0x0, &(0x7f00000005c0), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 480.077624][T25793] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 480.085773][T25797] EXT4-fs error (device loop4): ext4_map_blocks:594: inode #2: block 9: comm syz-executor.4: lblock 0 mapped to illegal pblock 9 (length 1) [ 480.095950][T25793] EXT4-fs (loop1): get root inode failed [ 480.111109][T25793] EXT4-fs (loop1): mount failed 02:46:18 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0xfffffffffffffd49) 02:46:18 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af30100040000000000000000000100090000", 0x2b, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:18 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) 02:46:18 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:18 executing program 5: semget(0x2, 0x466540d91f97cee2, 0x0) [ 480.314318][T25839] loop1: detected capacity change from 0 to 1051 [ 480.368286][T25838] loop4: detected capacity change from 0 to 69632 02:46:18 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0x20402) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000180)={0x0, 0x0, 0x5, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000380)="7b27f400aa", 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}) write$binfmt_aout(r0, &(0x7f0000000380)=ANY=[], 0x342) 02:46:18 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000040), &(0x7f00000000c0)) 02:46:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 480.444438][T25839] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 480.470109][T25838] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 480.508962][T25852] sg_write: data in/out 134/792 bytes for SCSI command 0x0-- guessing data in; [ 480.508962][T25852] program syz-executor.2 not setting count and/or reply_len properly [ 480.526963][T25839] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated 02:46:18 executing program 5: ioprio_set$uid(0x3, 0xffffffffffffffff, 0x2000) [ 480.555719][T25839] EXT4-fs (loop1): get root inode failed [ 480.607854][T25839] EXT4-fs (loop1): mount failed 02:46:18 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af30100040000000000000000000100090000", 0x2b, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:18 executing program 0: semtimedop(0x0, &(0x7f0000000500)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000540)={0x0, 0x3938700}) [ 480.628258][T25857] sg_write: data in/out 134/792 bytes for SCSI command 0x0-- guessing data in; [ 480.628258][T25857] program syz-executor.2 not setting count and/or reply_len properly 02:46:18 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:18 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0) 02:46:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:18 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0xb379, 0x1) 02:46:18 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af3010004000000000000000000010009000000", 0x2c, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:18 executing program 0: shmat(0x0, &(0x7f0000ff4000/0x1000)=nil, 0x6000) msync(&(0x7f0000fec000/0x14000)=nil, 0x14000, 0x4) [ 480.883671][T25874] loop1: detected capacity change from 0 to 1051 [ 480.899901][T25877] loop4: detected capacity change from 0 to 69632 [ 480.913067][T25874] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 02:46:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_EEE_HEADER={0x2, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_EEE_MODES_OURS={0xe44, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x1ac, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '@\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '!\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ']%/\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0xc8d, 0x5, "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"}, @ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0xec4}}, 0x0) 02:46:19 executing program 5: socketpair(0x10, 0x0, 0x0, &(0x7f0000001200)) [ 480.941561][T25877] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 480.954325][T25874] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated 02:46:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000007c0)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0xfffffeae}}, 0x0) [ 481.026768][T25874] EXT4-fs (loop1): get root inode failed [ 481.032933][T25874] EXT4-fs (loop1): mount failed 02:46:19 executing program 0: prlimit64(0x0, 0x9, &(0x7f00000003c0), &(0x7f00000014c0)) 02:46:19 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af3010004000000000000000000010009000000", 0x2c, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:19 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:19 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r1, &(0x7f0000000540)={&(0x7f0000000480), 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, r0, 0x1, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 02:46:19 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000600), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x14, r1, 0x1}, 0x14}}, 0x0) 02:46:19 executing program 5: r0 = gettid() r1 = getpgrp(0x0) rt_tgsigqueueinfo(r1, r0, 0xb, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) [ 481.295075][T25904] loop1: detected capacity change from 0 to 1051 [ 481.306239][T25907] loop4: detected capacity change from 0 to 69632 [ 481.325164][T25904] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 02:46:19 executing program 2: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000180)) socketpair(0x0, 0x0, 0x0, &(0x7f0000000200)) 02:46:19 executing program 0: socketpair(0xa, 0x5, 0x0, &(0x7f0000001200)) 02:46:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 481.461767][T25907] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 02:46:19 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af3010004000000000000000000010009000000", 0x2c, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:19 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, 0x0) [ 481.516990][T25904] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 481.551462][T25904] EXT4-fs (loop1): get root inode failed 02:46:19 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x400454a4, 0x0) 02:46:19 executing program 2: memfd_create(&(0x7f0000000000)='\x00', 0x7) [ 481.691541][T25904] EXT4-fs (loop1): mount failed 02:46:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:19 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:19 executing program 0: semop(0x0, &(0x7f0000000080)=[{}, {}], 0x2) 02:46:19 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:19 executing program 5: socketpair(0x442b177a0800e67e, 0x0, 0x0, &(0x7f00000011c0)) 02:46:19 executing program 2: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x101001) [ 481.907898][T25953] loop4: detected capacity change from 0 to 69632 [ 481.921577][T25953] EXT4-fs error (device loop4): ext4_fill_super:4953: inode #2: comm syz-executor.4: iget: root inode unallocated 02:46:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:20 executing program 5: openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0xb8844) [ 481.956092][T25953] EXT4-fs (loop4): get root inode failed [ 481.975911][T25961] loop1: detected capacity change from 0 to 1051 [ 481.976854][T25953] EXT4-fs (loop4): mount failed 02:46:20 executing program 0: socketpair(0xa, 0x0, 0x0, &(0x7f0000001200)) 02:46:20 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 482.036763][T25961] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 02:46:20 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f00000004c0)=[{0x0, 0x0, 0x3e4}]) [ 482.161619][T25961] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 482.175463][T25978] loop4: detected capacity change from 0 to 69632 02:46:20 executing program 5: semtimedop(0x0, &(0x7f0000000500)=[{}], 0x1, 0x0) [ 482.204526][T25961] EXT4-fs (loop1): get root inode failed [ 482.217277][T25961] EXT4-fs (loop1): mount failed 02:46:20 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 482.247451][T25981] loop2: detected capacity change from 0 to 3 [ 482.277341][T25978] EXT4-fs error (device loop4): ext4_fill_super:4953: inode #2: comm syz-executor.4: iget: root inode unallocated [ 482.322894][T25996] loop1: detected capacity change from 0 to 1051 [ 482.336022][T25978] EXT4-fs (loop4): get root inode failed [ 482.341951][T25996] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 482.354328][T25978] EXT4-fs (loop4): mount failed [ 482.363692][T25981] Dev loop2: unable to read RDB block 3 02:46:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 482.395824][T25981] loop2: unable to read partition table [ 482.415533][T25996] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated 02:46:20 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0x20402) write$binfmt_elf64(r0, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 02:46:20 executing program 5: select(0x40, &(0x7f0000000000)={0x10001}, 0x0, 0x0, 0x0) 02:46:20 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 482.479788][T25981] loop2: partition table beyond EOD, truncated [ 482.559997][T25996] EXT4-fs (loop1): get root inode failed [ 482.590530][T25981] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 482.610852][T25996] EXT4-fs (loop1): mount failed [ 482.652642][T26010] sg_write: data in/out 83886044/78 bytes for SCSI command 0x0-- guessing data in; [ 482.652642][T26010] program syz-executor.0 not setting count and/or reply_len properly 02:46:20 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {0x0, 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:20 executing program 5: syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x780f3be8e37d8609) 02:46:20 executing program 2: syz_open_procfs$namespace(0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000002940), r0) [ 482.701062][T26012] loop4: detected capacity change from 0 to 69632 [ 482.777931][T26012] EXT4-fs error (device loop4): ext4_fill_super:4953: inode #2: comm syz-executor.4: iget: root inode unallocated [ 482.795055][T26012] EXT4-fs (loop4): get root inode failed [ 482.801063][T26012] EXT4-fs (loop4): mount failed [ 482.814470][T26024] loop1: detected capacity change from 0 to 1051 02:46:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000007c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4, 0x3, 0x0, 0x0}]}]}, 0x1c}}, 0x0) [ 482.827189][T26024] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 02:46:20 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:20 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0xc, 0x0, &(0x7f0000000080)) [ 482.897303][T26024] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated 02:46:21 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x502) [ 482.979379][T26024] EXT4-fs (loop1): get root inode failed 02:46:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_AUTHENTICATE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="8400000083f219"], 0x84}}, 0x0) [ 483.040152][T26024] EXT4-fs (loop1): mount failed 02:46:21 executing program 0: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x7}, &(0x7f0000000280)={0x0, 0x989680}, 0x0) 02:46:21 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {0x0, 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 483.120501][T26044] loop4: detected capacity change from 0 to 69632 02:46:21 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) 02:46:21 executing program 5: semtimedop(0x0, &(0x7f0000000500)=[{}], 0x1, &(0x7f0000000540)={0x0, 0x3938700}) [ 483.169314][T26044] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 483.203542][T26044] EXT4-fs (loop4): group descriptors corrupted! 02:46:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x0, 0x0, {0x10}, [@ETHTOOL_A_EEE_HEADER={0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_EEE_MODES_OURS={0xe44, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x1ac, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '@\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '!\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ']%/\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0xc8d, 0x5, "8d3fb627360601a19ba65fec179c763b6593d613d47b63558aa003edee3b16d8afa2456a04c69407459aae29adeec3afcddc1d6a1cc13c05818165386ece361ffa31d4a097b67d65280469f147db13f45bf57432849f1d3d4c591f8c55ea99eb5a5aaac29c99fbf9938fa72851f4f2dbd8165a3efd2cc5d0b1de6dc49b580f10e7fc7486f8ae16bfad348b13fa8af09727cdd1243f202de3761f2c648f7a1986f91ca092593dd86a91157e1b39737954bebe8973ba58348605c711f9bc9da5b7a7a0a4882e1b646356759036ea20c52448822dd28452079369e8a8814b238c7807f7558f73dabf0d6b8312264ca44436a07c0da82f1779ae27cf65d884e025148f3e1bffe92bceb3027230cf30b02a58742b4522e2610240c2a9df61d03b90c4b320f737951477c177f27c406abf12140a9ff042663fcd1c29d4a1cb703e023669846527d11e06f2801bbe2920576335d3df2e570e5fc3c59c1c02e5e2a50b0037348acf78084af5817bee63609ec690f3739c5b2df4f884f6dd83a8d12d9710579d3d60df74cd6b9579f719339ab79454221253905848f1ccb45f1207dc8e7253695eb93f9a69e22ec261fab2b3d773f568d94772dc1a76d4df5a5ed26ca996360f41c3859ad6e6de85a05be0259abc60be3b7cd2dac0fd463f70e35b52ef68b5cec42939e66d4d48b716f43920b51c15f631e746b760f8124c4dbb5f54c6a1a566e1e09ca65c2f5acca756de1b96003701bb94eecc8e099f5ef05b22656c9fd14c942edd74777a32ab87923cc0cbb30e7b298a5dff7d7c760337c822be1c3fc5289e2b6d6ba148ccde865f926943b17c0ba056ad9794d4a8e4bab0a41345f0748907655e10015e6cfc09198159e070940d485f4adb5dd5958568dd9f7777753238dda122c1fc3d1ea506309794dc65ed74085a221b794fedfbb165e869bab2c629c3a90a0ebe71f536a5a7ed1ad1ea68c89ce2595dd8b63c4d4fb6e44c9e31ce9f2b75e06dd6ae067b08ab53c54882ad914d3eef4a6a87c44b493bb3ef3582b9d445332be8996d31d1536b6e4be9163587f3044966c9e36d741ca66f53a6af38b6898b241e22f10d9067872ed9a9855f2fd99b38d12c61f76cc664f483d33ea0db8aeaaf522fe57e2f95db7be889b521fe1e1981e408e163db2dd3b5c839d3ab640a9c641c0de8008929846d67f4bdbcd3d0cd42e719c81731b60a40b87ed3f0970b89817c4a9647d8b3eb60ce6bb91bbaabeac66051c3074b5eda54121e93908b45dd74c29dd5c711c5d29cb18b8114237b44e0f0de2511bf70776f99ca45ea539cda78280efa6aac24d1bc4b9f8d91f481d209cdd45b8ef81b884cf91b081ff39714eba3525a312ab1af55aadc92a56bfb586ad8f1cd8b8923d9d9ebd69f1febf12cb2bcb6ff01bc647dd66b848aa5cb28d68c74da662291e35a48fdbe3d809440339eb349f7a6ce6fcf5a46c79b1712fdfb673f95f6d168ee3af3d870e094a1f25f350eb70be797c7a78a8f4033fddb585dc470507624ef13f02d6a503f83e6285800ee3250987acf67f36be54fcadc4b5154c5151f344d4489d9340999239db46d749e177495bf889426d6b8b5d4ac2cf9550f85eaf43833d650cd6d3d05b0e8885e3edb836f8fdd9a9b20c52c0fba16a2ddf13f14d8ffdae890b8f051a9b34ee8af8239aa03971f03e1b24a46518aa94a710cfdb6de255cc9e4013b13169959dfe20a2b405798119de22d6aaf166753e2f04978e7df9a075027cc1f0fcb830c1e1a6616107292baba6db550c314274514482c0ca3fab2224ce7911d4bb4687532e44ae5d09cc738d17519e727061c779a90776a8545f684531bf878953b4287de683eed9b72d91442ff3b5a1d71e2dfe1aaa0967c5631d37b97c011f908420e83465ede8148775a813c178186c677ea72bfcad29fc5b5203fba9a1a1d0553676f7077b723af9cd4736382b969c8fd39ec3ea0000ee15b247c18f91558915f96dc4c85f504198913afbeda828f3b24c96a6c661f3e5e9c629363d5f370901a577abfeada3f9e0183474f8576ac257a8091cfc94a51dcbaa25fbb5f853bde5d142ac6bca2448e9211bd9750bb57cec1831f4033ce338bb57266af00c0fb3b5b45c8a58e1e40f9a46ca402b24d343246c8ed0ef88c27d0e309295338fb3a17b002bd3c5626764f1f84de98861eaf3f363b7fffb8a574c8b75085cb9122071b9e31623de3d19cb0f6a6d9fdf78b1e00369bf1b75a0b782496b2ed2dd6db7908630f929e60a09738bbaeaae61c4bb6c530189bf720c400132bd2a27efa55011a07aa892508c2796e34847b858136322f034ecfae056e888c9ed6c84bd3624e0abb5d6ffbf6abe8a6a803af0b582c1233e9bc5a4d9cfc1af32d79411a0f1a0675647cca589eb7b7b92e0356fe4824bd4ddc6cab3fd5090f8de38b5c7b581f994ad9e7f530e63edf10644fc83673145ae70b566a3a4ba6977cc268628a048dc107b74ae15e1cb73dc269500e86752cd0b552fe23b9e4a2f640d48cfd5cf303f7e7812e776f47a390bfefe6eadc9e7e4dc5c0fa73c9390d059cace969e0d499354899161d8a2bf8fd0cd95432b23541396f6f8021abb6cbb136b847cda61c0656a10d54b558cd6a7d0adf5020a37d99efa14d7757beaa049b4a5b08953b0467001f3a62fde5ddf161c84cfd48bc66225b1e92a13b00908e076ff387a073fe177175b7e2b70d9ca1e061a0e0d604a5f0d430e99c070f9272021979239a6f1d513454426d02b92b1e44924eafb6599c95e17d60d63b942b3e7d6dda6dbef019662a11b44bdc23f6f8b9ab6256eedf35c2e79783c6269630f51f3b35e067c14bcba6b97de7a2ef2f50c0219072263c0d94c9e5d121b6487d5b15da24fcb3e37ae6bdea0dccbe0d942440f8c31bdc82d2a028716812fe41b9987f4a624fa14961d95daad9ebc12f6c7e9c97ad6980b99c2b68f7cbb95651585e84b27f40033273317c95b43726b0caf7c455a25c497ff351399c6afa63aee4f53a611408a4589eb8b1a0a30ab3aee42054bace3aa01c5ab4a7365aba62b68b51b91918d1c8d9df6e3ef94ff4df1ed22c3efe15cc8597ff1c17a810a999111914c576148e0dacdf1ff837407c3a68af2aabbec8240ab7bbd317656ddd64237e2c317064f12db1ae9eb0e828e9fc4456a4acb1f155f33f274c962d5f84fae2917f8458822aa1c14184cca3f4f2c11c42199bc73fe4ecc0ee5eff8f76d8343fec4a43ed9bd18c355713092d629c7a5500351443dd7bfbfc0738339956b90c9317a3b12483209735a16cea02595e42e47f99a9e49a2a86155ebcc1680043250dd604fa5fff0ff485465e331f41ad1772089621ed038dc6785f43e7ce93d7f10a52c03798e2a0b93d83eb39bacbe16aaa5174b52a47fee443d7eb7d719b17d4edbce9bc00a3381a75b68ffc404c78448eaf885e936d4a84fe1a18ddad7a71a095e98362f645e273a19e55be25fcc601677c971fa4c734318b46cfc046ae983ae46c4a7406c75e5f0f1ebbf252c86bc34114dff47e6dadad94d30abc428a63ea8cd25e139f3992c9f25698c14d0f1692968371e12538582f47b215b4b63ffc02548f453215ebda53091223b342fd7891605d30dc929c512a29cb389169039d30a5937da2eeb19b6c14623149e8e533dc038bd14e137a72ffcdf789046dc87ff473da9ed5dec401ecd2e105763f4fa333555d96258bd1264c01190f440541f7f694cd1e7046e9b770415e1c2df49b51e5852f93b9fab4be238cddac5ca2ccc9232343d1bf177ae948461d3496575c5c46416b59816a6a24f1b7a11e86c8f9a3c99ded333bddd3717df72f97ad91e5a0216a8daed905528e6266f3d7f1281f6074e65db7f833ad6b8dd043f770645162471f05c0054340687ab9c3c5f24d0c2b224f93cef80d5036868d0212040c376a81bdb9105c296cbe2ac80e6e41d2f7a928abab49e8f5b346040f66ab4cf5327964b17e3a03fa39f5910fdc29882120619c0f8c8ea04083ca02d9c77b21b95300e2874a3f2f9443a4db9361f85fa96cdf166d821029d03e1c344051c42cf960899c368c756614c2b1c1db30e094ec1884e21f9fa184c05c5e5ca315233ca6a1bb4df7cae2614dc1e5b3787992b684ada8e4fc28e1b73d1b4cf4c4f9c8aeb6000faea2bdecb5594200ffa602de9c969b826a1d4566b880795ea93715d43ec8761116d2330e213e6b9aeadd3a17664169d6ab742bc447bba50ccce6512c91bc0a890ac65b12e1403292af64bcc1680c7b254f0309c2c1a97b5bdd3049c0063fc551b9d1d7f1626658d435a1a5e0bf7e7ed8ff6b401b07a10cdf60c81dcd933e98f910a442cbeeaf2ae5d14ade27f1fb8d6c5ed1fcf341cb589804afcacf7b518ce3a3b0ef810c0eee305fd6e383beab1c3e8cb4e65ede69260d97312c22466ec0ff7699df633562296d64e656067a6bf562dd2b7bbf8a51ef16bad4fee3229265a9e53f507b332011878727dba68d4044d261e0746cd113e92df915aac37a9bb789ab70ce76f532"}, @ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0xec4}}, 0x0) [ 483.259658][T26060] loop1: detected capacity change from 0 to 1051 [ 483.286469][T26060] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 02:46:21 executing program 5: syz_open_dev$vcsa(&(0x7f0000000180), 0x0, 0x8601) 02:46:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 483.361166][T26060] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated 02:46:21 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:21 executing program 0: pselect6(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000240), &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) 02:46:21 executing program 2: pselect6(0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000240), 0x0) [ 483.430597][T26060] EXT4-fs (loop1): get root inode failed [ 483.436398][T26060] EXT4-fs (loop1): mount failed 02:46:21 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {0x0, 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:21 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000000980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 02:46:21 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x801c581f, 0x0) 02:46:21 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0x8, 0x4) [ 483.563324][T26082] loop4: detected capacity change from 0 to 69632 [ 483.583357][T26082] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 483.594266][T26082] EXT4-fs (loop4): group descriptors corrupted! [ 483.665110][T26092] loop1: detected capacity change from 0 to 1051 02:46:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:21 executing program 2: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000100)={{0x2, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}}) [ 483.741845][T26092] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 02:46:21 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 483.791218][T26092] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated 02:46:21 executing program 0: r0 = getpgrp(0x0) ptrace$setregset(0x4205, r0, 0x0, 0x0) [ 483.837867][T26092] EXT4-fs (loop1): get root inode failed [ 483.855096][T26092] EXT4-fs (loop1): mount failed 02:46:21 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 483.946632][T26110] loop4: detected capacity change from 0 to 69632 02:46:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:22 executing program 2: fork() fork() waitid(0x0, 0x0, 0x0, 0x100000a, 0x0) [ 484.002474][T26110] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 02:46:22 executing program 0: syz_genetlink_get_family_id$nbd(&(0x7f00000001c0), 0xffffffffffffffff) [ 484.045749][T26110] EXT4-fs (loop4): group descriptors corrupted! 02:46:22 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 484.222390][T26129] loop1: detected capacity change from 0 to 1051 [ 484.232799][T26134] loop4: detected capacity change from 0 to 69632 [ 484.292719][T26134] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 484.314136][T26134] EXT4-fs (loop4): group descriptors corrupted! [ 484.331300][T26129] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 484.391755][T26129] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 484.418917][T26129] EXT4-fs (loop1): get root inode failed [ 484.424714][T26129] EXT4-fs (loop1): mount failed 02:46:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) clock_gettime(0x0, &(0x7f0000002b80)={0x0}) recvmmsg(r0, 0x0, 0x0, 0x2101, &(0x7f0000002bc0)={r1}) 02:46:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:22 executing program 0: ioprio_set$uid(0x0, 0xffffffffffffffff, 0x2000) 02:46:22 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:22 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, 0x0) [ 484.595314][T26150] loop4: detected capacity change from 0 to 69632 [ 484.631640][T26150] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock 02:46:22 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003600000019000000600100000ff68f01000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000000080)) [ 484.644556][T26153] loop1: detected capacity change from 0 to 1051 [ 484.647215][T26150] EXT4-fs (loop4): group descriptors corrupted! [ 484.687831][T26153] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) 02:46:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x0, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000800)={0xec4, 0x0, 0x0, 0x70bd2c, 0x0, {}, [@ETHTOOL_A_EEE_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_EEE_MODES_OURS={0xe44, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x1ac, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '@\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x789}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '!\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ']%/\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3117}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0xc8d, 0x5, "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"}, @ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0xec4}}, 0x0) [ 484.752973][T26153] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 484.774623][T26169] loop5: detected capacity change from 0 to 4 [ 484.802087][T26153] EXT4-fs (loop1): get root inode failed [ 484.809219][T26153] EXT4-fs (loop1): mount failed [ 484.881465][T26169] EXT4-fs (loop5): bad geometry: block count 54 exceeds size of device (2 blocks) 02:46:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000007c0)={0x24, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x10, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0xe}, @ETHTOOL_A_BITSET_VALUE={0x4}, @ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x24}}, 0x0) 02:46:23 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:23 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:23 executing program 5: syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x62001) 02:46:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, 0x0, &(0x7f00000005c0)) [ 485.148333][T26190] loop4: detected capacity change from 0 to 69632 [ 485.163009][T26192] loop1: detected capacity change from 0 to 1051 02:46:23 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000400)) [ 485.233395][T26190] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 485.237207][T26197] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 02:46:23 executing program 0: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000300), 0x200000, 0x0) clone3(&(0x7f0000000b80)={0x21bb21100, 0x0, 0x0, &(0x7f00000005c0), {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) [ 485.282455][T26192] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 485.301634][T26190] EXT4-fs (loop4): group descriptors corrupted! [ 485.311142][T26192] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated 02:46:23 executing program 2: clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) pselect6(0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000240)={0x0, r0+10000000}, &(0x7f00000002c0)={&(0x7f0000000280)={[0x1]}, 0x8}) [ 485.333797][T26202] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 485.350126][T26192] EXT4-fs (loop1): get root inode failed [ 485.355886][T26192] EXT4-fs (loop1): mount failed 02:46:23 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:23 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="0300000004", 0x5, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 485.492643][T26217] loop4: detected capacity change from 0 to 69632 [ 485.509972][T26217] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 485.512800][T26221] loop1: detected capacity change from 0 to 1051 [ 485.536624][T26221] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) [ 485.558350][T26221] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 485.572682][T26217] EXT4-fs (loop4): group descriptors corrupted! 02:46:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x0, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:23 executing program 5: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, r0, 0x1, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 02:46:23 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue0\x00'}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f0000000040)={0x0, @time, 0x0, {}, 0x0, 0x0, 0x20}) write$sndseq(r0, &(0x7f0000000000)=[{0x1e, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x0, 0x0}}], 0xfd63) 02:46:23 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 485.701794][T26221] EXT4-fs (loop1): get root inode failed [ 485.764484][T26221] EXT4-fs (loop1): mount failed 02:46:23 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000040), 0x4) 02:46:23 executing program 0: socket$inet(0x2, 0xa, 0xfffffffd) 02:46:23 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="0300000004", 0x5, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 485.864623][T26237] loop4: detected capacity change from 0 to 69632 [ 485.884420][T26237] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 485.905147][T26237] EXT4-fs (loop4): group descriptors corrupted! 02:46:24 executing program 0: socketpair(0x10, 0x0, 0xa, &(0x7f0000001200)) 02:46:24 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000000)={'icmp\x00'}, &(0x7f0000000040)=0x1e) 02:46:24 executing program 2: r0 = getpgrp(0x0) waitid(0x1, r0, 0x0, 0x4, 0x0) 02:46:24 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400), 0x0, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 486.116519][T26253] loop1: detected capacity change from 0 to 1051 02:46:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000000080)) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) [ 486.171769][T26253] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) [ 486.232137][T26263] loop4: detected capacity change from 0 to 69632 [ 486.240179][T26253] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 486.270925][T26263] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 486.272963][T26253] EXT4-fs (loop1): get root inode failed [ 486.300306][T26263] EXT4-fs (loop4): group descriptors corrupted! [ 486.310782][T26253] EXT4-fs (loop1): mount failed 02:46:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x0, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:24 executing program 5: clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0x2}, 0x0, &(0x7f0000000180)={r0, r1+60000000}, 0x0) 02:46:24 executing program 2: waitid(0x0, 0x0, &(0x7f0000000080), 0x0, 0x0) 02:46:24 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={0x0}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={0x0}}, 0x0) 02:46:24 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:24 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="0300000004", 0x5, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 486.800109][T26283] loop4: detected capacity change from 0 to 69632 02:46:24 executing program 2: semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000000)=""/184) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f00000000c0)=""/49) 02:46:24 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CCA_MODE(r0, &(0x7f0000002a80)={0x0, 0x0, 0x0}, 0x0) [ 486.850182][T26286] loop1: detected capacity change from 0 to 1051 [ 486.871562][T26283] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) 02:46:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) [ 486.914615][T26283] EXT4-fs (loop4): group descriptors corrupted! [ 486.971344][T26286] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) [ 487.022893][T26286] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 487.047390][T26286] EXT4-fs (loop1): get root inode failed [ 487.053249][T26286] EXT4-fs (loop1): mount failed 02:46:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000180)="e63ec46be682d213e67c7e6f2a280f06", 0x10) 02:46:25 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:25 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000", 0x7, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 487.301563][T26309] loop1: detected capacity change from 0 to 1051 [ 487.356110][T26309] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) [ 487.359461][T26312] loop4: detected capacity change from 0 to 69632 [ 487.381960][T26312] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 487.392194][T26309] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 487.405477][T26312] EXT4-fs (loop4): group descriptors corrupted! [ 487.415317][T26309] EXT4-fs (loop1): get root inode failed [ 487.422142][T26309] EXT4-fs (loop1): mount failed 02:46:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:25 executing program 2: socketpair(0xa, 0x6, 0xfffffffc, &(0x7f0000002300)) 02:46:25 executing program 0: clone3(&(0x7f0000000b80)={0x0, 0x0, 0x0, &(0x7f00000005c0), {}, 0x0, 0x0, 0x0, 0x0}, 0x5e) 02:46:25 executing program 5: select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x2}, &(0x7f00000000c0)={0x0, 0x2710}) 02:46:25 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f00", 0x10, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:25 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000", 0x7, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 487.866545][T26332] loop1: detected capacity change from 0 to 1051 02:46:26 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000002940), r0) [ 487.907170][T26335] loop4: detected capacity change from 0 to 69632 [ 487.925755][T26332] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) 02:46:26 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, @remote}}) [ 487.950490][T26335] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (61595!=0) [ 487.961805][T26335] EXT4-fs (loop4): group descriptors corrupted! [ 487.969538][T26332] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated 02:46:26 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000006c0)={0x2c, r1, 0x1, 0x0, 0x0, {0x3}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}]}]}, 0x2c}}, 0x0) 02:46:26 executing program 0: syz_open_procfs$namespace(0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001240)) [ 488.016069][T26332] EXT4-fs (loop1): get root inode failed [ 488.046874][T26332] EXT4-fs (loop1): mount failed 02:46:26 executing program 5: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000080)) [ 488.180387][T26361] loop4: detected capacity change from 0 to 69632 [ 488.243921][T26361] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 488.276976][T26361] EXT4-fs (loop4): group descriptors corrupted! 02:46:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:26 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="03000000040000", 0x7, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:26 executing program 5: syz_open_dev$vcsa(&(0x7f0000000980), 0x0, 0x90000) 02:46:26 executing program 2: socketpair(0x10, 0x0, 0x2, &(0x7f0000001200)) 02:46:26 executing program 0: r0 = shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x4000) r1 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmat(r1, &(0x7f0000ffb000/0x4000)=nil, 0x6000) shmdt(r0) 02:46:26 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:27 executing program 2: syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) [ 488.937682][T26378] loop1: detected capacity change from 0 to 1051 [ 488.949670][T26380] loop4: detected capacity change from 0 to 69632 02:46:27 executing program 0: syz_mount_image$xfs(&(0x7f0000000180), &(0x7f00000001c0)='./file2\x00', 0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f0000000040)={[{@logdev={'logdev', 0x3d, './file2'}}]}) 02:46:27 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000080)={0x0, 0x3, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4ee1d394"}, 0x0, 0x0, @userptr}) [ 489.031407][T26378] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) [ 489.077242][T26380] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 489.111788][T26380] EXT4-fs (loop4): group descriptors corrupted! 02:46:27 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000", 0x18, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 489.120743][T26378] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated 02:46:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername(r0, &(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000000)=0x80) accept$alg(r1, 0x0, 0x0) [ 489.170716][T26378] EXT4-fs (loop1): get root inode failed [ 489.204032][T26378] EXT4-fs (loop1): mount failed 02:46:27 executing program 2: io_setup(0xa762, &(0x7f0000000000)) [ 489.225012][T26399] XFS (loop0): Invalid device [./file2], error=-15 [ 489.274233][T26404] loop4: detected capacity change from 0 to 69632 [ 489.279608][T26399] XFS (loop0): Invalid device [./file2], error=-15 [ 489.385097][T26404] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 489.431382][T26404] EXT4-fs (loop4): group descriptors corrupted! 02:46:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:27 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:27 executing program 5: keyctl$join(0xffffff1f, 0x0) 02:46:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000000)=0x8, 0x4) 02:46:27 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r0, 0x0) socket$inet6(0xa, 0x6, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c40), 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000000)={0x1ff}, 0x0, 0x0) 02:46:27 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:28 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r1}}, 0x10) [ 489.967390][T26430] loop1: detected capacity change from 0 to 1051 [ 489.992597][T26434] loop4: detected capacity change from 0 to 69632 02:46:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffff9c, &(0x7f0000007c40), 0x2, 0x0) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, {&(0x7f0000000040)=""/6, 0x6, &(0x7f0000000080)=""/17}}, 0x48) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4, 0x10010, 0xffffffffffffffff, 0x10000000) [ 490.039100][T26434] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 490.064552][T26430] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) [ 490.089463][T26434] EXT4-fs (loop4): group descriptors corrupted! [ 490.101745][T26430] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 490.114549][T26430] EXT4-fs (loop1): get root inode failed [ 490.125149][T26430] EXT4-fs (loop1): mount failed 02:46:28 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:28 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="81811581000000000000000000000000000000000000000000000000000000004cba99bf717845a0a45395f57da3a43f000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d00000000000000600000000000000010000000000000000100000001000000010000000100000610000000400000000000000000000000000000000000000000000004509000000000000000000000001", 0xca, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 490.447543][T26457] loop4: detected capacity change from 0 to 69632 [ 490.505473][T26460] loop1: detected capacity change from 0 to 1051 [ 490.514914][T26457] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 490.541270][T26461] loop0: detected capacity change from 0 to 256 [ 490.564343][T26457] EXT4-fs (loop4): group descriptors corrupted! [ 490.578262][T26460] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) 02:46:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffff9c, &(0x7f0000007c40), 0x2, 0x0) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, {&(0x7f0000000040)=""/6, 0x6, &(0x7f0000000080)=""/17}}, 0x48) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4, 0x10010, 0xffffffffffffffff, 0x10000000) [ 490.608624][T26461] BTRFS: device fsid 4cba99bf-7178-45a0-a453-95f57da3a43f devid 1 transid 7 /dev/loop0 scanned by syz-executor.0 (26461) [ 490.644162][T26460] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 490.670797][T26461] BTRFS error (device loop0): superblock checksum mismatch [ 490.683778][T26461] BTRFS error (device loop0): open_ctree failed [ 490.709557][T26460] EXT4-fs (loop1): get root inode failed [ 490.775986][T26460] EXT4-fs (loop1): mount failed 02:46:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:29 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f00030004000000000000000000", 0x1c, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffff9c, &(0x7f0000007c40), 0x2, 0x0) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, {&(0x7f0000000040)=""/6, 0x6, &(0x7f0000000080)=""/17}}, 0x48) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4, 0x10010, 0xffffffffffffffff, 0x10000000) 02:46:29 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:29 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r0, 0x0) socket$inet6(0xa, 0x6, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c40), 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000000)={0x1ff}, 0x0, 0x0) 02:46:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffff9c, &(0x7f0000007c40), 0x2, 0x0) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, {&(0x7f0000000040)=""/6, 0x6, &(0x7f0000000080)=""/17}}, 0x48) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4, 0x10010, 0xffffffffffffffff, 0x10000000) [ 491.102182][T26489] loop4: detected capacity change from 0 to 69632 [ 491.161915][T26489] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (33325!=0) [ 491.170233][T26497] loop1: detected capacity change from 0 to 1051 02:46:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:29 executing program 0: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r0, 0x0) socket$inet6(0xa, 0x6, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c40), 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000000)={0x1ff}, 0x0, 0x0) [ 491.204304][T26489] EXT4-fs (loop4): group descriptors corrupted! [ 491.235189][T26497] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) [ 491.265362][T26497] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 491.284235][T26497] EXT4-fs (loop1): get root inode failed [ 491.291028][T26497] EXT4-fs (loop1): mount failed 02:46:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffff9c, &(0x7f0000007c40), 0x2, 0x0) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, {&(0x7f0000000040)=""/6, 0x6, &(0x7f0000000080)=""/17}}, 0x48) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4, 0x10010, 0xffffffffffffffff, 0x10000000) 02:46:29 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:29 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 491.599286][T26518] loop1: detected capacity change from 0 to 1051 02:46:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(0xffffffffffffffff, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 491.731219][T26518] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 491.759423][T26524] loop4: detected capacity change from 0 to 69632 [ 491.870291][T26518] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 491.905487][T26524] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 491.924593][T26518] EXT4-fs (loop1): get root inode failed [ 491.930969][T26518] EXT4-fs (loop1): mount failed [ 491.945837][T26524] EXT4-fs (loop4): group descriptors corrupted! 02:46:30 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:30 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:30 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r0, 0x0) socket$inet6(0xa, 0x6, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c40), 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000000)={0x1ff}, 0x0, 0x0) 02:46:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(0xffffffffffffffff, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:30 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="6b6d19ff06ff"}, 0xfffffffffffffeb0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newlink={0xc0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfec91f44}, [@IFLA_LINKINFO={0x90, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x80, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x2, 0x1b}}, @IFLA_VLAN_INGRESS_QOS={0x40, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x100, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1, 0x7fffffff}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffff, 0x20}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8001, 0x6}}]}, @IFLA_VLAN_EGRESS_QOS={0x28, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xe368, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0xff}}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0xc0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) pipe2$9p(&(0x7f0000000000), 0x0) [ 492.314080][T26538] loop4: detected capacity change from 0 to 69632 02:46:30 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6, 0x0, "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030cf00"}, 0xd8) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(0xffffffffffffffff, 0x0, 0x4008000) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x5, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000001c0)={0x0, 'wg1\x00'}, 0x18) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000300)=ANY=[@ANYRESDEC=r0], 0x1000001bd) [ 492.416562][T26543] loop1: detected capacity change from 0 to 1051 [ 492.438921][T26538] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 492.469985][T26538] EXT4-fs (loop4): group descriptors corrupted! [ 492.481950][T26543] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 492.501127][T26548] device vlan2 entered promiscuous mode 02:46:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(0xffffffffffffffff, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 492.519907][T26548] device bond0 entered promiscuous mode [ 492.533586][T26548] device bond_slave_0 entered promiscuous mode [ 492.554754][T26543] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated 02:46:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:30 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f00", 0x1e, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 492.572558][T26548] device bond_slave_1 entered promiscuous mode [ 492.597077][T26543] EXT4-fs (loop1): get root inode failed [ 492.603136][T26543] EXT4-fs (loop1): mount failed [ 492.609980][T26548] device bond0 left promiscuous mode [ 492.620118][T26548] device bond_slave_0 left promiscuous mode [ 492.626366][T26548] device bond_slave_1 left promiscuous mode 02:46:30 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 492.832422][T26567] loop4: detected capacity change from 0 to 69632 02:46:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 492.905178][T26567] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=0) [ 492.960338][T26567] EXT4-fs (loop4): group descriptors corrupted! [ 492.969437][T26572] loop1: detected capacity change from 0 to 1051 [ 493.022656][T26572] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 493.044984][T26548] device vlan2 entered promiscuous mode 02:46:31 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 493.063429][T26572] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 493.088524][T26572] EXT4-fs (loop1): get root inode failed [ 493.089564][T26548] device bond0 entered promiscuous mode [ 493.105785][T26572] EXT4-fs (loop1): mount failed [ 493.115662][T26548] device bond_slave_0 entered promiscuous mode [ 493.122255][T26548] device bond_slave_1 entered promiscuous mode [ 493.135458][T26548] device bond0 left promiscuous mode [ 493.143048][T26548] device bond_slave_0 left promiscuous mode [ 493.159404][T26548] device bond_slave_1 left promiscuous mode [ 493.192555][T26588] loop4: detected capacity change from 0 to 69632 02:46:31 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:31 executing program 2: perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) listen(r0, 0x0) socket$inet6(0xa, 0x6, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000c40), 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$mice(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000000)={0x1ff}, 0x0, 0x0) 02:46:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, 0x0, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 493.269455][T26588] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 493.304570][T26588] EXT4-fs (loop4): group descriptors corrupted! 02:46:31 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 493.404781][T26596] loop1: detected capacity change from 0 to 1051 [ 493.457908][T26596] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 493.489559][T26596] EXT4-fs (loop1): orphan cleanup on readonly fs [ 493.499344][T26596] EXT4-fs error (device loop1): ext4_orphan_get:1414: comm syz-executor.1: bad orphan inode 33554432 02:46:31 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="6b6d19ff06ff"}, 0xfffffffffffffeb0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newlink={0xc0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfec91f44}, [@IFLA_LINKINFO={0x90, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x80, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x2, 0x1b}}, @IFLA_VLAN_INGRESS_QOS={0x40, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x100, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x1, 0x7fffffff}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xffff, 0x20}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8001, 0x6}}]}, @IFLA_VLAN_EGRESS_QOS={0x28, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xe368, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7f, 0x7}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0xff}}]}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0xc0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) pipe2$9p(&(0x7f0000000000), 0x0) 02:46:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_setup(0x45db, &(0x7f0000000540)) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r1, &(0x7f0000000a40)=""/102400, 0x19000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:31 executing program 5: perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000bff000/0x400000)=nil, 0x400000) mremap(&(0x7f0000e95000/0x1000)=nil, 0x1000, 0x1000, 0x7, &(0x7f0000ffc000/0x1000)=nil) mremap(&(0x7f00005d9000/0x4000)=nil, 0x4000, 0x4000, 0x7, &(0x7f0000ffc000/0x4000)=nil) madvise(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x4) rename(0x0, 0x0) [ 493.592536][T26596] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 493.630329][T26612] loop4: detected capacity change from 0 to 69632 [ 493.681992][T26612] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) 02:46:31 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 493.740092][T26612] EXT4-fs (loop4): group descriptors corrupted! 02:46:31 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e", 0x1f, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:31 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:46:32 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000200)="0f34", 0x2}], 0x1, 0x0) read(r0, &(0x7f0000000180)=""/51, 0x33) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 493.999405][T26630] loop1: detected capacity change from 0 to 1051 [ 494.018573][T26630] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 494.036986][T26634] loop4: detected capacity change from 0 to 69632 02:46:32 executing program 5: semop(0xffffffffffffffff, &(0x7f0000000000)=[{0x4, 0xfff, 0x1000}, {0x0, 0x8d, 0x1000}, {0x3, 0x101}, {0x2, 0x1, 0x1800}, {0x4, 0x80}, {0x1, 0x1, 0x1800}, {0x4, 0x23, 0x1000}, {0x4, 0x4, 0x2000}, {0x4, 0x400, 0x800}], 0x9) semop(0xffffffffffffffff, &(0x7f0000000040)=[{0x1, 0x2, 0x800}, {0x4, 0xffff, 0x800}, {0x3, 0x5, 0x1800}, {0x0, 0x1, 0x1800}, {0x2, 0xfff}], 0x5) r0 = semget(0x0, 0x1, 0x210) semop(r0, &(0x7f0000000080)=[{0x4, 0x1, 0x400}, {0x0, 0x3}], 0x2) semctl$IPC_RMID(r0, 0x0, 0x0) semctl$GETZCNT(r0, 0x0, 0x7, &(0x7f00000000c0)=""/218) semop(r0, &(0x7f00000001c0)=[{0x4, 0x4, 0x1000}, {0x3, 0x54a5, 0x1000}, {0x0, 0xb}], 0x3) semget$private(0x0, 0x3, 0x0) r1 = semget$private(0x0, 0x3, 0x100) semop(r1, &(0x7f0000000200)=[{0x1, 0x7, 0x800}, {0x2, 0x69}, {0x1, 0x2, 0x1800}, {0x4, 0x4f3, 0x1800}, {0x2, 0x4, 0x800}, {0x2, 0x1, 0x1000}, {0x0, 0x5, 0x1000}], 0x7) semop(r0, &(0x7f0000000240)=[{0x4, 0x1, 0x1800}, {0x1, 0x4, 0x1800}, {0x3, 0xfbff, 0x800}, {0x2, 0x20, 0x800}, {0x2, 0x3}, {0x2, 0x8, 0x1000}], 0x6) r2 = semget(0x0, 0x1, 0x2) semop(r2, &(0x7f0000000280)=[{0x3, 0x24d, 0x800}, {0x110d1e1efa0b930c, 0x5, 0x1000}, {0x2, 0x2, 0x800}, {0x4, 0xf1, 0x1800}, {0x0, 0x4, 0x800}, {0x3, 0xf001, 0x1000}, {0x3, 0x6, 0x1000}, {0x3, 0x100, 0x1800}], 0x8) semctl$IPC_RMID(r1, 0x0, 0x0) semop(0x0, &(0x7f00000002c0)=[{0x2, 0x5, 0x1800}, {0x3, 0x8}, {0x2, 0x8}, {0x0, 0x5b}, {0x0, 0x6, 0x800}, {0x0, 0x9, 0x800}, {0x0, 0x7ff}], 0x7) [ 494.040949][T26630] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 494.062028][T26634] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (26926!=46) [ 494.089173][T26634] EXT4-fs (loop4): group descriptors corrupted! 02:46:32 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x12, 0x0, 0xe3c0}) [ 494.104462][T26630] EXT4-fs (loop1): get root inode failed [ 494.110832][T26630] EXT4-fs (loop1): mount failed 02:46:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xec, 0xec, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}, @struct={0x0, 0x8, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}, {0x0, [0x0]}}, 0x0, 0x107}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:46:32 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:32 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:32 executing program 5: mq_unlink(&(0x7f0000000040)='\x00\xae\xd80x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_settime(r0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f0000000240)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, 0x0, 0x20008811) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x0, 0x0, &(0x7f0000000400)='GPL\x00', 0x7, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) timer_create(0x1, &(0x7f0000000040)={0x0, 0x15}, &(0x7f00000000c0)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000400)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) 02:46:32 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 494.503846][T26666] EXT4-fs (loop1): get root inode failed [ 494.511145][T26666] EXT4-fs (loop1): mount failed 02:46:32 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {0x0, 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 494.714004][T26689] loop4: detected capacity change from 0 to 69632 [ 494.786627][T26689] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 494.819483][T26693] loop1: detected capacity change from 0 to 1051 [ 494.832568][T26689] EXT4-fs (loop4): group descriptors corrupted! [ 494.887811][T26693] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 494.964682][T26693] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 494.985822][T26693] EXT4-fs (loop1): get root inode failed [ 495.012549][T26693] EXT4-fs (loop1): mount failed 02:46:35 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:46:35 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:35 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_setup(0x45db, &(0x7f0000000540)) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r1, &(0x7f0000000a40)=""/102400, 0x19000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 497.081897][T26712] loop1: detected capacity change from 0 to 1051 [ 497.109820][T26712] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 497.115969][T26718] loop4: detected capacity change from 0 to 69632 [ 497.132434][T26712] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 497.132684][T26718] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 497.154566][T26718] EXT4-fs (loop4): group descriptors corrupted! [ 497.161546][T26712] EXT4-fs (loop1): get root inode failed [ 497.167307][T26712] EXT4-fs (loop1): mount failed 02:46:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x8000, 0x200, 0x80, 0x20000}, 0x1c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0xf000, &(0x7f0000000100)="b9ffe0ff6044238cb89e14f088a81bffffff00004000632977fbac141442e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000}, 0x2c) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000280), 0x4) 02:46:35 executing program 5: prlimit64(0x0, 0xe, 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000080)) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x16}, &(0x7f0000000200)=0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_settime(r0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) futex(&(0x7f0000000240)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, 0x0, 0x20008811) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x17, 0x0, 0x0, &(0x7f0000000400)='GPL\x00', 0x7, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) timer_create(0x1, &(0x7f0000000040)={0x0, 0x15}, &(0x7f00000000c0)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000400)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) 02:46:35 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:35 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 497.557933][T26733] loop1: detected capacity change from 0 to 1051 [ 497.565864][T26735] loop4: detected capacity change from 0 to 69632 [ 497.641039][T26733] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 497.659621][T26733] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 497.674663][T26733] EXT4-fs (loop1): get root inode failed [ 497.680708][T26733] EXT4-fs (loop1): mount failed [ 497.713750][T26735] EXT4-fs (loop4): unsupported descriptor size 0 02:46:35 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400), 0x0, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:35 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) [ 498.009892][T26754] loop4: detected capacity change from 0 to 69632 [ 498.051103][T26754] EXT4-fs (loop4): unsupported descriptor size 0 [ 498.071922][T26758] loop1: detected capacity change from 0 to 1051 02:46:36 executing program 2: r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$FBIOBLANK(r0, 0x4611, 0x4) [ 498.129246][T26758] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 498.147869][T26758] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 498.164725][T26758] EXT4-fs (loop1): get root inode failed [ 498.172158][T26758] EXT4-fs (loop1): mount failed 02:46:38 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:46:38 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:38 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="0300000004", 0x5, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:38 executing program 2: open(&(0x7f00000000c0)='./bus\x00', 0x1031fe, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000100)=""/199) r0 = socket(0x2, 0x803, 0xff) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="0e01000000000000002e"], 0xe) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x81) r2 = dup(r0) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 02:46:38 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000600), 0x4) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860073ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 500.250582][T26782] loop1: detected capacity change from 0 to 1051 [ 500.294147][T26784] loop4: detected capacity change from 0 to 69632 [ 500.298345][T26782] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) [ 500.337924][ T25] audit: type=1804 audit(1628822798.393:119): pid=26780 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir468337911/syzkaller.Avv6GH/630/bus" dev="sda1" ino=15528 res=1 errno=0 [ 500.353940][T26782] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated 02:46:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 02:46:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/135, 0x87}, 0x0) [ 500.422295][T26784] EXT4-fs (loop4): unsupported descriptor size 0 [ 500.465242][T26782] EXT4-fs (loop1): get root inode failed [ 500.471001][T26782] EXT4-fs (loop1): mount failed 02:46:38 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:38 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="0300000004", 0x5, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:38 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x4, &(0x7f0000000240)) 02:46:38 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000140)={@local, @local, @val, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @remote, @rand_addr, @remote, @local={0xac, 0x14, 0x0}}}}}, 0x0) [ 500.675965][T26806] loop4: detected capacity change from 0 to 69632 [ 500.733951][T26812] loop1: detected capacity change from 0 to 1051 [ 500.737870][T26806] EXT4-fs (loop4): unsupported descriptor size 0 [ 500.761063][T26812] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) [ 500.790873][T26812] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 500.806253][T26812] EXT4-fs (loop1): get root inode failed [ 500.812180][T26812] EXT4-fs (loop1): mount failed [ 501.127619][ T1372] ieee802154 phy0 wpan0: encryption failed: -22 [ 501.134164][ T1372] ieee802154 phy1 wpan1: encryption failed: -22 02:46:41 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:46:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 02:46:41 executing program 5: r0 = socket$inet6(0x18, 0x1, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000000), 0x8) 02:46:41 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:41 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaeaaaaaaaa86dd60fcf0b6003001000000000028000000000000000000000100000000000000000020"], 0x0) 02:46:41 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="0300000004", 0x5, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 503.316779][T26834] loop4: detected capacity change from 0 to 69632 [ 503.328615][T26833] loop1: detected capacity change from 0 to 1051 02:46:41 executing program 2: syz_emit_ethernet(0x36, &(0x7f00000000c0)={@broadcast, @random="b7d8d281b375", @val, {@ipv6}}, 0x0) [ 503.394189][T26834] EXT4-fs (loop4): unsupported descriptor size 0 [ 503.400983][T26833] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) 02:46:41 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000000), 0x4) [ 503.470022][T26833] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 503.508682][T26833] EXT4-fs (loop1): get root inode failed 02:46:41 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 503.516384][T26833] EXT4-fs (loop1): mount failed 02:46:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 02:46:41 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000000)={0x8}, 0x8) 02:46:41 executing program 2: socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x1002, &(0x7f0000000000)=0x8000, 0x4) [ 503.648454][T26860] loop4: detected capacity change from 0 to 69632 [ 503.670463][T26860] EXT4-fs (loop4): unsupported descriptor size 0 02:46:44 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x9, r0, 0x0, 0x0) 02:46:44 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="03000000040000", 0x7, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:44 executing program 2: socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x100, &(0x7f0000000000), 0x4) 02:46:44 executing program 5: syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @local, @val, {@ipv6}}, 0x0) 02:46:44 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0), 0x0, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = io_uring_setup(0x45db, &(0x7f0000000540)) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000240), 0x0) read(r2, &(0x7f0000000a40)=""/102400, 0x19000) close_range(r1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 02:46:44 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0xffff, 0x1006, 0x0, 0x0) 02:46:44 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000080)="90ac7d7090cacca9b7c9903d51a3eedac9e93b8c4d949e7bfcee4ea1af28c89f725f306eebebe7f9a27414632288db654e993069ac1214dbb002905d04c86fa6a6c7a971a7a54b40818e8754dd8b82c8659e30b6eca27ed0b154b08f4c05337eb4f37a2950c3693a3fe51f30cf960b8313e101440c524a13dd27e3bbccc6c2bb22db960ac97fe7c11e330b124543d520bc", 0x91, 0x8, 0x0, 0x0) [ 506.499342][T26878] loop4: detected capacity change from 0 to 69632 [ 506.510007][T26879] loop1: detected capacity change from 0 to 1051 02:46:44 executing program 2: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$inet_opts(r0, 0x0, 0x1, 0x0, 0x0) 02:46:44 executing program 3: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@local, @local, @val, {@ipv6}}, 0x0) [ 506.550054][T26878] EXT4-fs (loop4): unsupported descriptor size 0 [ 506.576232][T26879] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) 02:46:44 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) listen(r0, 0x0) [ 506.622535][T26879] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 506.664869][T26879] EXT4-fs (loop1): get root inode failed [ 506.672521][T26879] EXT4-fs (loop1): mount failed 02:46:44 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0), 0x0, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 506.832296][T26909] loop4: detected capacity change from 0 to 69632 [ 506.854579][T26909] EXT4-fs (loop4): unsupported descriptor size 0 02:46:47 executing program 3: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8000, 0x0) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 02:46:47 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="03000000040000", 0x7, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:47 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x9, r0, 0x0, 0x0) 02:46:47 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @empty, @val, {@ipv6}}, 0x0) 02:46:47 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x4, &(0x7f0000000080), 0x4) 02:46:47 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0), 0x0, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 509.580091][T26924] loop1: detected capacity change from 0 to 1051 [ 509.626781][T26930] loop4: detected capacity change from 0 to 69632 02:46:47 executing program 2: utimensat(0xffffffffffffffff, 0x0, &(0x7f00000000c0)={{0x0, 0x7fffffff}}, 0x0) 02:46:47 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt(r0, 0x0, 0x9, &(0x7f0000000000), 0x0) 02:46:47 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60252a9b001496007b4eefd96f9905ad97ca4cf7afdd165a000000000000000000004e"], 0x0) [ 509.712304][T26930] EXT4-fs (loop4): unsupported descriptor size 0 [ 509.717486][T26924] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) 02:46:47 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa0000", 0x10, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 509.808086][T26924] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated 02:46:47 executing program 2: syz_emit_ethernet(0xe, &(0x7f0000000140)={@local, @local}, 0x0) [ 509.850669][T26924] EXT4-fs (loop1): get root inode failed [ 509.879582][T26924] EXT4-fs (loop1): mount failed 02:46:48 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000200)=@abs={0x0, 0x0, 0x2}, 0x8) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 02:46:48 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="03000000040000", 0x7, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 509.938804][T26953] loop4: detected capacity change from 0 to 69632 02:46:48 executing program 3: select(0x40, &(0x7f0000000100)={0xdeadbeef}, 0x0, 0x0, 0x0) [ 509.987854][T26953] EXT4-fs (loop4): unsupported descriptor size 0 [ 510.129675][T26964] loop1: detected capacity change from 0 to 1051 [ 510.205411][T26964] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) [ 510.246111][T26964] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 510.258567][T26964] EXT4-fs (loop1): get root inode failed [ 510.265702][T26964] EXT4-fs (loop1): mount failed 02:46:50 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$cont(0x9, r0, 0x0, 0x0) 02:46:50 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa0000", 0x10, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:50 executing program 2: open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 02:46:50 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000000100)="ad1af1e6dd96e7dccab0", 0xfffffffffffffd58}, {&(0x7f0000000080)="3254e2aa86802922d8a2eae11d66b27d8a449620dd0b833dd56c336ee475217699f998773637c743e80e82603ecf212cc94ba809099688e98963f5dbbf15eecce73d5a6554303e14b5b65431a5bd74c8d040caaa4ae76228", 0x58}, {&(0x7f00000001c0)="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", 0x722}], 0x3}, 0x0) 02:46:50 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:50 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) listen(r0, 0x0) bind(r0, &(0x7f0000000000)=@in6={0x18}, 0xc) [ 512.779720][T26987] loop4: detected capacity change from 0 to 69632 [ 512.792410][T26985] loop1: detected capacity change from 0 to 1051 02:46:51 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, 0x0, 0x0) 02:46:51 executing program 5: symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') utimensat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x2) 02:46:51 executing program 2: shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x6000) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) syz_io_uring_setup(0x3d87, &(0x7f0000000000), &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) [ 512.916175][T26987] EXT4-fs (loop4): unsupported descriptor size 0 [ 512.938961][T26985] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) [ 513.008422][T26985] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated 02:46:51 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa0000", 0x10, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 513.079549][T26985] EXT4-fs (loop1): get root inode failed [ 513.085713][T26985] EXT4-fs (loop1): mount failed 02:46:51 executing program 3: syz_emit_ethernet(0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="ffffffffffffb6d8d281b37586dd607a6c0800000000fe8000080000000000000000bbfe80000035"], 0x0) 02:46:51 executing program 5: setrlimit(0x0, &(0x7f0000000000)) setrlimit(0x0, &(0x7f00000006c0)) [ 513.201007][T27013] loop4: detected capacity change from 0 to 69632 [ 513.254179][T27013] EXT4-fs (loop4): unsupported descriptor size 0 02:46:53 executing program 2: r0 = socket$inet(0x2, 0x3, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x3}, 0xc) 02:46:53 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:53 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:46:53 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x1004, &(0x7f0000000000), 0x4) 02:46:53 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) listen(r0, 0x0) connect(r0, &(0x7f0000000080)=@in6={0x18, 0x2}, 0xc) 02:46:53 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e5", 0x18, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 515.948779][T27034] loop4: detected capacity change from 0 to 69632 [ 515.959092][T27035] loop1: detected capacity change from 0 to 1051 02:46:54 executing program 3: syz_emit_ethernet(0x263, &(0x7f0000000140)=ANY=[@ANYBLOB="ffffffffffffb7d8d281b37586dd607a6c08022d0000fe16d4768000000000000000000000000000bb"], 0x0) 02:46:54 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0xffff, 0x1005, 0x0, 0x0) [ 516.065744][T27035] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) [ 516.069098][T27034] EXT4-fs (loop4): unsupported descriptor size 0 02:46:54 executing program 2: select(0xffffffffffffff0b, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 02:46:54 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e5", 0x18, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 516.170929][T27035] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 516.199202][T27035] EXT4-fs (loop1): get root inode failed [ 516.207185][T27035] EXT4-fs (loop1): mount failed 02:46:54 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001000), 0x0, 0x0) read(r0, &(0x7f0000001040)=""/4081, 0xff1) 02:46:54 executing program 3: mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4) 02:46:54 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="0300000004000000", 0x8, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:54 executing program 5: syz_emit_ethernet(0x38, &(0x7f00000000c0)={@broadcast, @random="b7d8d281b375", @val, {@ipv6}}, 0x0) [ 516.319220][T27063] loop4: detected capacity change from 0 to 69632 [ 516.385023][T27063] EXT4-fs (loop4): unsupported descriptor size 0 [ 516.501744][T27073] loop1: detected capacity change from 0 to 1051 [ 516.530099][T27073] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (28213!=0) [ 516.555116][T27073] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 516.570139][T27073] EXT4-fs (loop1): get root inode failed [ 516.577021][T27073] EXT4-fs (loop1): mount failed 02:46:57 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:46:57 executing program 3: syz_mount_image$udf(0x0, 0x0, 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f0000000380)="86", 0x1, 0x388c}, {&(0x7f0000000500)="bb", 0x1, 0x80000001}], 0x0, 0x0) 02:46:57 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e5", 0x18, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:46:57 executing program 2: r0 = socket$inet(0x2, 0x3, 0x8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) 02:46:57 executing program 5: add_key(&(0x7f0000000100)='logon\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="8d", 0x1, 0xfffffffffffffffb) 02:46:57 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:46:57 executing program 2: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 519.096447][T27090] loop3: detected capacity change from 0 to 264192 [ 519.106313][T27092] loop1: detected capacity change from 0 to 1051 [ 519.116284][T27094] loop4: detected capacity change from 0 to 69632 02:46:57 executing program 5: socket(0x10, 0x2, 0x0) socket$unix(0x1, 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f0000000600), 0x0, &(0x7f0000000780)={0xcd}, &(0x7f0000000000), 0x0) [ 519.169541][T27092] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 519.180447][T27094] EXT4-fs (loop4): unsupported descriptor size 0 [ 519.197829][T27092] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated 02:46:57 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 519.214908][T27090] loop3: detected capacity change from 0 to 264192 02:46:57 executing program 3: request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000240)="c5", 0x1, 0xffffffffffffffff) [ 519.275127][T27092] EXT4-fs (loop1): get root inode failed [ 519.293651][T27092] EXT4-fs (loop1): mount failed 02:46:57 executing program 2: syz_mount_image$nfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x401, &(0x7f00000001c0)={[], [{@permit_directio}]}) [ 519.333339][T27111] loop4: detected capacity change from 0 to 69632 02:46:57 executing program 5: r0 = socket(0x11, 0xa, 0x0) sendmmsg$unix(r0, &(0x7f0000000540)=[{{&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, 0x0}}], 0x1, 0x0) [ 519.409339][T27126] nfs: Unknown parameter 'permit_directio' [ 519.421348][T27126] nfs: Unknown parameter 'permit_directio' [ 519.424722][T27111] EXT4-fs (loop4): unsupported descriptor size 0 02:47:00 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:47:00 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) bind$packet(r0, &(0x7f00000000c0), 0x14) 02:47:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x50, &(0x7f0000000100)={0x3, {{0x10, 0x2}}}, 0x88) 02:47:00 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:47:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffe1}]}) timer_create(0x0, 0x0, &(0x7f0000000180)) 02:47:00 executing program 3: syz_mount_image$iso9660(&(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)={[{@sbsector}]}) [ 522.198784][T27143] loop4: detected capacity change from 0 to 69632 [ 522.211668][T27144] loop1: detected capacity change from 0 to 1051 [ 522.246235][T27143] EXT4-fs (loop4): unsupported descriptor size 0 [ 522.259081][T27144] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 522.276700][ T25] audit: type=1326 audit(1628822820.336:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27136 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0xffff0000 02:47:00 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000000), 0x10) fork() [ 522.321849][T27144] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated 02:47:00 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378", 0x1c, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 522.382504][T27144] EXT4-fs (loop1): get root inode failed 02:47:00 executing program 5: r0 = add_key$user(&(0x7f0000001440), &(0x7f0000001480)={'syz', 0x3}, &(0x7f00000014c0)="a7", 0x1, 0xfffffffffffffffc) keyctl$get_keyring_id(0x0, r0, 0x0) [ 522.458257][T27144] EXT4-fs (loop1): mount failed 02:47:00 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 522.610380][T27161] ISOFS: Unable to identify CD-ROM format. 02:47:00 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffe2}]}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 522.650321][T27169] loop4: detected capacity change from 0 to 69632 [ 522.706645][T27169] EXT4-fs (loop4): unsupported descriptor size 0 [ 522.715904][T27179] loop1: detected capacity change from 0 to 1051 [ 522.724214][T27161] ISOFS: Unable to identify CD-ROM format. [ 522.740087][ T25] audit: type=1326 audit(1628822820.796:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27178 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0xffff0000 [ 522.743099][T27179] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60729!=0) [ 522.805240][T27179] EXT4-fs error (device loop1): ext4_fill_super:4953: inode #2: comm syz-executor.1: iget: root inode unallocated [ 522.818039][T27179] EXT4-fs (loop1): get root inode failed [ 522.828765][T27179] EXT4-fs (loop1): mount failed 02:47:03 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:47:03 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x6, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000003e40)=[{&(0x7f0000000180)="6e5cedf2784af46fc1e82a94dcf94d1ef453ea01e08f661406be5732e3afd0da214f9deeed49eeb0edef1d187abe1d722d2480ffe9"}, {&(0x7f0000000900)="8a0ef83003da0ea5b278533ed87a019818871726539bef6585e1ced9a552875951a68c37f5ba2f85bbcc95d8745825f90741440817a06bcda47110e35b28443aecd16ef640a0407e9c8e0220f87441d414bdab4423a35d1885cf94db9c7eb1e4b84a31e7970a00000000000000", 0x6d}, {&(0x7f0000003a80)="1785522503a1403b71b414314d38ed5b2918d71714f11783ed019ef5c60656c2", 0x20}, {&(0x7f00000019c0)="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", 0xfffffdbf}, {&(0x7f00000039c0)="933aadcd01b5d49bf0f5625ef88144e200b070b0373530fbaa25ea2feec4fcb3b0407b40573b53213cd97dfb03069a7178199c94c4cdf1cfd9630faa8b09e3497556c93edf7c14d2c9e5f2901be5ff3f0b05dc30e4411a45fd9241ab78708734ba9eef78a504c0285ba1bc71147b021eab11f6bbe78b47f1006d5c2709d39b762ca201dcfa2d2da9868975bf7f8ccd948b6c3389413c5dc9a0752b0be3fd0f36ce77db35", 0xa4}, {&(0x7f0000003c80)="352ce59fcf7f417e004f4382fb1db3781826c6c9ee94f808193ee0c7ad79a3553ad517bf6afd0e9fc79de303805efe34cce85d9d0ac32997dfb0002a402ec9457a979557ce32a5e6d9d077f5d9e865509b0cdde995341b", 0x57}, {&(0x7f0000003b00)="37bfdead22f6839a336ca17aa2ff4bf11f3fcc06f20d360681526e341545602b0ab3cf68abea49dc269b768710d52ab74ce6fd441edb193e2ce5252b2ee31fcd046f6ee3ad2439dd767d9fdcab2d93d79763c87bc68bf8d6087c16fc2efa72feb0c8003e6142cd8d1a05aac5357a5460b9f6e3a031ad286293620e6c4cde18471a0b0d3023bbb84ecd06837fc48bde9f63a609a5a7c2b0803ef5195298eae6ef49c1c6cfe8cef8702d4c9cf764579c2f93fe6b2f7524bea9b9db369150ddbb758b649733d056166b5303637fd1ebf8be33c77c544714dd357bfe266043c69e6a830000000000", 0xe6}, {&(0x7f0000000240)="1bfb264ee5b77cfdcc95dd7fbb0fc068e674351a5906abe08eb36ac02468679f906412f2aa18af6f", 0x28}, {&(0x7f0000003ac0)="00354754087b603f7fa5e8ea8c70095c5c57efa027a089a0c0c764ec2d4d376802668ba9f45ad929b1e17f"}, {&(0x7f0000003d00)="cc192567b950f214c7a1abca076b5ae98502fc342f206533fef93684b32e5732177e35b5e7f45f3866b6b31ba84a2edbac67e2d84b2e318d245c1b0be9f8771c78ec58029871cfd4a1a4590f2062241fc32d91f4f82492cb65b8f7"}, {&(0x7f0000003d80)="1fbcfe9d008d1ec07a89eaf4b4e0549d962aabad46895950c1ecc37b56c477021ce0f0efa25c313176c084cd325741e10d516b578b8668fd40a79a8adda13c05d53dc8aa1fb839148eefd10545ec9f777ad93e6cfa0d9116e605bb94f7258c5ba152927eff5a2c136b8c2699de80c7b57c423ae4fe25fb887cffc1f51836a0e2045518de6ecdc3625ab24196b9d405a1e16f113b0985ba8203360dd57ed90e7ff83a7eb72c8e452b0d9b637fd0749200"}], 0x8, 0x0) io_setup(0x1ff, &(0x7f0000000400)) 02:47:03 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000b00)={0x0}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_DISASSOCIATE_REQ(r1, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000440)={0x14}, 0xff57}}, 0x0) 02:47:03 executing program 3: syz_mount_image$iso9660(0x0, 0x0, 0x0, 0x2, &(0x7f0000003300)=[{&(0x7f0000000200)="cd2799e9c4f31b8534da83efb8010d9edc297659c7f2cf6c8e2ccbf3567e6aa5641f7e2139db79a9a1ba2cfcae6381f080b8cf63f698f7bdaaeb258617843a2f07dd2060e5b003e7ca1a6214597a27c3a055d2fac6c1bb13cbe66c25d728684722ced1be3db82ef202875a7c2cfe0f4d2b324d1ae5f6673af9f4d73e2be4d52ff7bab3275ab6fb3f0cd4fea9c45a26337de054a72a0482c92f68acfe374647f57415cf2709b0c5eb6045ee426cc2e1060d29d1f1ab7485030766b4560b30815cc073ba8c6222656330d164507b7618c4c660b6d3c7a128b06c1ca755a99891b1bf3a4b5900557b63c9d661e37236b202101ad08306996de575ee873a48a27adbde72b153c6b0cb0c9974e7346892bede5204a11b32c2e0705a468c6e3794039a76634ad8e720da345e7bdbf7b906875a917e085015f587f3c699a9ffdedb3c4b4fb61efc144d619c13b055b8acf3eb6c57ce51168a8177b4e2f494c970c2a5c47039fd8e327686236a9a73739af7f04209deec4430fe5f3220450b473d026e4b0b141072ba84e6b3bfc9a94975b9e0ad212f89b78db8431a7b1d943e4e8420af2fc4380be1aba9354727ee2bd8e2320a5d7c9b6a1f2ee8c3702fcc49bc0b94480bd9091c34914b5fd89aae56401f01ae94d432eeab6674dee3ac4730546d3bf79006106d22d5548f671798a521c14a49f1d790a1b04d7352c54839425e544d6b00facff874a7017d44df30ab4fe956c5cd36ca06d6e51d6bf37dd0bdade7625ac02942aeea0ee29123811cc1db72ff17984d5ef0b6b13d7afc6ffdb32f513207ccd8dd7d8a6592eec9ef663d48837cb2e92ce22f24c6d7f4104ffddba828bdb893f1b71609a607ac8e65e44cca7e6182eee792c48002e3144f358dc9f2059d556287ff2620aaa701ec4d41b9aabef2ee04db78060bb241909ee54fc0cdb0e9e88b42906f67909f0e34de32eeb87547c10401bfffcc9dbf751cb34cc654402a54d92e3ad8224d21ea4acbabf848cc59c07a59f4ef129ccc4454b0d8d93b154ff96947fc8ca5a6a680b2e1560b8a7ba0b9d8e4ae3b72a59f84f71416d0eb69b6bf5ec0ff9a527538d397b48aa5043f5b5a95d1eb7a6dfaaa09e3f8363cdcd046173888c32d293b494e3d58ce4b33c5ac29ba76fc095012bf4faecad7c6596c24bf51e4a75e45311506505e536feae25342229d5be317f84a08dc502aafe0c35e5b259a80a8e0efd37169f783666d67070fbc350de9d9ea1661f21bd31be1ce18d7e539c07ae55a36418f2a2d47d0795f2fd36ad8151ba89d6e9b964d1f95e60a42a422d78d546c4f5541f49dfcb3b91c41b6dd581af0de458103c8a7a2b15e3ab8fa0190f27653c02a0f8f27e6be44833332c6736ad7818042305612e9fbb61864d48bccaf73f84f8c0dfdf94e931cc37028f2ff8945e8c1219e4720a48fab2ad07e11ef8fe71cdbe6ace640eeb31d73143bf92a1ec83a39a80263fd47b1988867349eee1f0cb85983a3914f765bdd7fdaec6b776e949d1a2cfb848823b86fbc3c2fcbe41fdfa4a127674770f988a4b51597e28657abb983da4e89a0b2c3374d543cf195d08a18758fe70cfc799836882c91efa1578dfd5bc6ef39b4304dd0c2c838fee4f8f8bb7c3ae30fdcae8ee1e5b1254429762b22d533b18dde5c9802812c07b0e7627aae96665e01d396a31299f46f8652fc532c605fa43fcf46247171b0336ef362c1f78bd4e6e715722112e128a08dc610f45968105f9d591aeb5b9ae5bb32ec93147f826c907110bca7eea41c3f4d92d761b488ee715dbec7ff7c044eb3b961671ae4f6f500d035d81ad76d2fd13e10bc2da792f79af9ac942fdd724c4275d24c6cea248473ae5c45130b5803c0288d00bbd8fcad347c6b8b8caad7e921e8f81c153a1ecc0e518f139e59299521de0757c47e29993b7d175b623e6313d6967cd8cce48c1b8ed82fa5f11f91e226286c03ca352258881d48d84adf4ec1b4541dca93d64c981ebe84e8f5faf97d3f3508340ab80b2a04bad6361ab2a03796cca36fa74028269105fcc83fec45a3c96394ff5ac5b672b788b1b359026dbe8fef2f32ec269dc95727a53cae2c802ee54158cc4cd7587df0ba03f7403aeac7626007ab6b2b9af83a8de529944b8a6d4f9347083bb2ed1d03dd90a5a3b230493f17dae644b009cae20f5972801cbeba2c0bd352466066fabea773e7365490683161308610edd1a286c2e06ad8b211a512b6e0a9ceec2c55da869757fb2b6f2d8e8dd701f80b640aab2dcbfea74f1bffdc20723d04d75cbd132ef61fbec929a8a6116def739f65d5807b6ccb79d5539e0d01b54512058c8f7f8c1fe13d7a86c681144878bb23b9c6ead794a4b6cab93a2c2cc3b168ad02471da6e13d58b23629482454e8d9ace0727175b35edad0c837191c234f282a1b76b032b7c0008c4081955f331f18d0549e7fb3014aeae12effae3047bc3047ed8d030c57f30d70f5b92dc9395188c8123b8dcd6891d825eb0f0b8bd633cd415e4c8519e97e2c1678921e37f5c1b6d2194c1fd67334b83ca79fd091132e12a50fad09b2557ee3f2ccf1291f6d9549d1354de1d41994fa177d30f5f87225df78fd3140dfddccc67398ccd7ff4af4295159bcc6ea433f45a048af7a206438b581f9d66869f5cb7bab9eceb93d878c22fbcc5c8d490610f72cf9fbe6b6ce9a960696ffcf2d0f9ba9ec229614e04e212f3789003edbd133ec967d46ef0f140451b8d1ed435563204e8db3db222448d9ec86791199adba809681475807507b196602461cef89d0159d3ee39fce95f4f033b545aa4fdfd7a9df926f67aa0163fd553a28dcbcc78b4c2938a3e354cbfbda937ce00b4b88f44ced06ed34ef35fe440a93f317f663038343795d82dcaefb7e74f667f05181e2296a71ba42f5b33650876d44d0d4d18acd3626fb368fffc4ff54b06e67d4aeef03ab6420b13281ecba6da24e2507e4cb5acee5dedf90fda3de507a7038be2509721751e0e85f1f0786a7176e5c9a5790e7f276e988c65506a8e9bf4bdbe5c2db76e73a66cada8d8fcded88f58b0301313d6587942a5d173dde8868a81cc2af98e84eba91344cf48a1c0e5b8c6487d532cd5e5cc40bd4c6100d0fb6c37d1b0e540a706a8d8ffc94624cb048438d3f90cc784ac029ee69753fefb8ccd8c7985c544aebf0dcf1a083da06f6c044c4366ec115236558f07bf27a1e210e0013b4506b4216e373d00f177d648796c4fdb22dc54dff24303658441ed7f1ea06648caac1de530cb0769efffd23a88f6d17220942e2b6abf34fa228d24e20db0cc383d61b74ae6525a967d6bbf447413d72732ca1fc74a01e4e7b6bd374837fdedbf27075a47fbaf4ea6b6730711fafc6f551a8a3358890e3ff1f54e1be58c0638e330e8b48239915b919da83194df96c558d3b40bf68b32b8fe94822d99f22d6d75f1d962b55e2b88922d03d1d568699e8fc9f7b5f5be686693396e9b36d6718524eca15786da70b3f2c39ffc58f088c2be610dad0b50e3846cd842184487da5d1d746a0c3a543bb10a43710d5f54ecca7f4a7f7fd360d86f1d2eea50a3d7fc182a008a1aeaca1ac470090f6cbd6f2fc44681771bacfcabe96f558f169ea01a75eaa6cae5ccf477c3786d35d84da3706f6ee5cbf5e1c36ab7f0c92f031d8ee3abcf7fab3217425129d510526278949b7c88b0f2245ad5248797463b14f71274d89fa68798e0262d50d8379afdd087696d43ef6f3b91ddd3cd19966e5a568879f187733d10ea742d3d9b256a5682b9d90375fbddbc26f1fd0a5b8ded9d8cabc6041037d3fec2389655e11d6028f7bed47ddbb2b77641034c24987c6ae8d97c7be580e051193b03ccfe5883b1c90cadcc4b2aadfb107ee572fd29433e1e985dae472edc286c10a1cd813d35d520e0d3e09a9d30983054b396e1827e216983e9d6b8e568d9046b7c842d3e55c0bb465c9e44858d3d5000a70ad800e109d0581996f1753bd21e1245c59ba2a57a5a2b12e8fe7ee77e5f81df935e5adc5c21651b3ff9e5243a7ab4ff9284b02e799e6f11db3702bb80fd787cc168d90cb2347368a5c6c19f751392820225891f1c738e5362500b7c0b578b333992d52a151a1c80fdb227e00d446c5ce54dad0968a8e35d59ec222b91587b99a92750284a5c5433860140e7b328a2794c8377c74d2211a082fd46da579b38c41d7e0cae44a850e59c93a4d31cff71f051e2db0b838ce3d5ebc1000b13b9a23943cee3a69f975502d6bf7c03627d5a1041149ac184d2fe2f12f72ad2e82ef7435abc25bf536f131e31569c66934d9e803c391e964ff6c1fd886682ed1ecec2d3e31766ace10791c7d1c32126d4b43a816afd9b90ed62c0e0ec556282d8dd7ef5da2273e4cdbed205700662d8f3b8b3bd809da1dbd9bb8641d5af4464a40ddb8d6eafa3aa8f1d666b29f5378cd67bc783414171d8697fa3932cec5838ab12103e7b617b0835ab23a8c94d06d651c84bf2f6a1f01af262bd8ce05c97f3e5ff17d704d616dc1c8627d6f9295bcd5da8aadcc38e37b28ac2e0ffb00ec2430c1e0dc700e3c9b2dc344496891293ce6347c16614f5b5a7ac153fca42e083040eaecd45bd7b794965da055dc773344d2c0e2dcf76dee45dfd22512e165cab59cf896f471a9c92786f017ec433333efec1aa578d994bc985d84b2de78c1d1943ecd450daa4c4a5797f29734dd30946e40659c29fc23bab1865eda55e030c611c3753a9bd8e8430c9bf75b07f280b219afee97f3c8707684905be82c2900d36fb19586c4a9f131bc3356da55d0abb181d791f8a5faa9d057455c57a04afaf8274ece712c25b42327bb8c1994a9492182a56bd67d5da1e16e55250ce1c9738348535d397ef41518e5c4c578ded86d580c26e9afeba5bc504806a7b98030e0bd4eccac6256c45ac8af9f6fe2b86b6719e3766aea01ffc99f2e6266a97b6e6849e9f15fe7afaf8fa1fdab1b8a62d8c6ac080587afbb2936a74e1e249276f39e99ed5a597a7d6f6c7073eaa5155d73f67446e8261f2bbca9263efaa70a1f1c17a1d868a0a7e750ba5ea1e3e3930ca7b30e026335ec4b2cd7fd0290652ff6f0ee3046aada883165eb5d23aafcaf08c0d8f1fc3999163fac22955c59cbda4d37642ee09b9e62cd9f8bcb6cbb818ccc4192c73ca48a7d8a873bda96bca075b2dc39da836dc4be36d771139e67be78d5bc7d0d6673927788dcff6e31fee79a2859ff724e107d5a342084e02e4a434664e130a11283de991287ce32d5817c2a9539ccb4a34d04a185d6a0f6f83add0d6c1f84598bb58825966bdb784f4799a9148731eba395976dd1b8177a228915a0350f3fd6ae06761e161acf905024d6f45867a246ea68f60420088aa3691681a10108895b6ec7e40746b652e8981f19b4115d5f1ba508c8038f39f94453023ff072b14553870ce4b60836ab14d86336e0383ab0e34fec500a4822e46c935f31ba0c6d243202068cb77f9e54303df5cf0e916e8b8d8df4d08d88e8764a1b4c71b81d816a531afb41163c615c2429f06e60058d1327050aea9828d6d292728954d453e270a71ae80aedbb5a91229afd42145805838fd0dbad2d4f71200b0a285aef8ca80b19213da87123a59709708933707064b4a052a70aa34304b98b662b5bd2fb41eb4d8b3446aa9c2ea6f83c54917d576718aba75927b54a4b8e0233db602d525ea8b4900e6b15ca739986cf4896f66aa99288290c40f4132b32b454169cb5ccc6c0af6cd417e2a9dc58d2aa10d001d2e2c6d8271b2a3bcba17e02", 0x1000, 0x1000}, {&(0x7f0000001200)="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", 0xffe, 0x3}], 0x0, 0x0) 02:47:03 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:47:03 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 525.306501][T27205] loop1: detected capacity change from 0 to 1051 [ 525.322001][T27208] loop4: detected capacity change from 0 to 69632 [ 525.347559][T27209] loop3: detected capacity change from 0 to 16 02:47:03 executing program 2: prctl$PR_GET_NAME(0x10, &(0x7f0000000500)=""/56) sysfs$2(0x2, 0x0, &(0x7f0000000240)=""/214) [ 525.406941][T27205] EXT4-fs (loop1): unsupported descriptor size 0 [ 525.424970][T27208] EXT4-fs (loop4): unsupported descriptor size 0 02:47:03 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:03 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffe2}]}) time(0x0) 02:47:03 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:47:03 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xffffffe2}]}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) fremovexattr(r0, &(0x7f00000001c0)=@known='system.posix_acl_default\x00') [ 525.578252][ T25] audit: type=1326 audit(1628822823.637:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27225 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0xffff0000 02:47:03 executing program 2: add_key(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) [ 525.638623][T27230] loop1: detected capacity change from 0 to 1051 [ 525.660240][T27230] EXT4-fs (loop1): unsupported descriptor size 0 [ 525.697293][ T25] audit: type=1326 audit(1628822823.757:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27234 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0xffff0000 [ 525.708930][T27238] loop4: detected capacity change from 0 to 69632 [ 525.797868][T27238] EXT4-fs (loop4): unsupported descriptor size 0 02:47:06 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:47:06 executing program 3: r0 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f0000000040)={{}, {r1, r2+10000000}}, &(0x7f0000000080)) 02:47:06 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x4, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:06 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f00000090c0)=[{{&(0x7f0000000100)=@nl=@proc, 0x80, 0x0}}], 0x1, 0x0) 02:47:06 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e5277033780100", 0x1e, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:47:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}, [@NL80211_ATTR_WIPHY={0x8}]}, 0x28}}, 0x0) [ 528.399091][T27260] loop4: detected capacity change from 0 to 69632 [ 528.409231][T27261] loop1: detected capacity change from 0 to 1051 [ 528.454473][T27260] EXT4-fs (loop4): unsupported descriptor size 0 [ 528.486903][T27261] EXT4-fs (loop1): unsupported descriptor size 0 02:47:06 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0xffffffe2}]}) fork() sched_getparam(0x0, &(0x7f0000000000)) 02:47:06 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='uid=', @ANYRESHEX]) 02:47:06 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:06 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:47:06 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffe2}]}) pipe(&(0x7f0000000000)) [ 528.688282][ T25] audit: type=1326 audit(1628822826.747:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27279 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0xffff0000 02:47:06 executing program 2: r0 = socket(0x10, 0x2, 0x0) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c000000195a65"], 0x1c}}, 0x0) [ 528.740052][T27291] loop4: detected capacity change from 0 to 69632 [ 528.741787][T27288] loop1: detected capacity change from 0 to 1051 [ 528.756135][ T25] audit: type=1326 audit(1628822826.797:125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27283 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0xffff0000 [ 528.816990][T27291] EXT4-fs (loop4): unsupported descriptor size 0 [ 528.901149][T27288] EXT4-fs (loop1): unsupported descriptor size 0 02:47:09 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:47:09 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000400)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='veth0_macvtap\x00', 0x10) listen(0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 02:47:09 executing program 3: syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000003300), 0x0, &(0x7f0000003380)={[{@nojoliet}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}]}) 02:47:09 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:47:09 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@void, @void, @val={0xc}}}, [@NL80211_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) [ 531.570030][T27323] loop4: detected capacity change from 0 to 69632 [ 531.598637][T27330] loop1: detected capacity change from 0 to 1051 02:47:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0xec8, 0x0, 0x0, 0x0, 0x0, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}, @WGDEVICE_A_LISTEN_PORT={0x6}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_FWMARK={0x8}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_PEERS={0xe70, 0x8, 0x0, 0x1, [{0x30, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}]}, {0x40, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x20, 0x9, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}]}]}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @private}}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x3c8, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x3c4, 0x9, 0x0, 0x1, [{0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @broadcast}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @dev}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}, {0x130, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @remote}}, {0x5}}]}, {0x13c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}]}]}]}, {0xc0, 0x0, 0x0, 0x1, [@WGPEER_A_PRESHARED_KEY={0x24, 0x2, "d8ef315e92a29219cc768e881708692d413394f2f6e31ba2a3ebf8960ff2168c"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @loopback}}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @empty}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x0, 0x0, @remote}}]}, {0xf8, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_ALLOWEDIPS={0xd8, 0x9, 0x0, 0x1, [{0xac, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}]}]}, {0x87c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x0, @empty}}, @WGPEER_A_PUBLIC_KEY={0x24}, @WGPEER_A_ALLOWEDIPS={0x374, 0x9, 0x0, 0x1, [{0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}]}, {0x124, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}]}, @WGPEER_A_ALLOWEDIPS={0x4cc, 0x9, 0x0, 0x1, [{0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0xd0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}]}, {0x118, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @local}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5}}]}]}]}]}]}, 0xec8}}, 0x0) 02:47:09 executing program 2: syz_mount_image$nfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x10c1004, &(0x7f0000001680)) 02:47:09 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffe2}]}) syslog(0x0, 0x0, 0x0) [ 531.625792][T27323] EXT4-fs (loop4): unsupported descriptor size 0 [ 531.656696][T27330] EXT4-fs (loop1): unsupported descriptor size 0 02:47:09 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:47:09 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {0x0, 0x0, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:09 executing program 5: syz_mount_image$iso9660(&(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x0, &(0x7f0000000600)={[{@sbsector}, {@mode}, {@uid}, {@session}]}) [ 531.895392][ T25] audit: type=1326 audit(1628822829.957:126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27352 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0xffff0000 [ 531.943713][T27358] loop1: detected capacity change from 0 to 1051 [ 531.966326][T27359] loop4: detected capacity change from 0 to 69632 [ 532.032844][T27358] EXT4-fs (loop1): unsupported descriptor size 0 [ 532.049427][T27359] EXT4-fs (loop4): unsupported descriptor size 0 02:47:12 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:47:12 executing program 2: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14d842, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x80000001) r3 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) read(r3, &(0x7f0000019500)=""/102395, 0x18ffb) 02:47:12 executing program 3: r0 = timerfd_create(0x8, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x0, 0x989680}}, 0x0) 02:47:12 executing program 5: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 02:47:12 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:12 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x3, &(0x7f0000000200)=[{&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 534.644951][T27382] loop4: detected capacity change from 0 to 69632 [ 534.655426][ T25] audit: type=1800 audit(1628822832.718:127): pid=27381 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=14067 res=0 errno=0 [ 534.690726][T27383] loop1: detected capacity change from 0 to 1051 02:47:12 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x3, 0x0, 0x0, 0xd50}]}) 02:47:12 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffe2}]}) fremovexattr(0xffffffffffffffff, 0x0) [ 534.742704][T27383] EXT4-fs (loop1): unsupported descriptor size 0 [ 534.789275][T27382] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 534.844483][ T25] audit: type=1804 audit(1628822832.848:128): pid=27388 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir468337911/syzkaller.Avv6GH/661/bus" dev="sda1" ino=14067 res=1 errno=0 02:47:13 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x20c00) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={0x0}) 02:47:13 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:13 executing program 2: r0 = socket(0x10, 0x2, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000000), r0) 02:47:13 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x3, &(0x7f0000000200)=[{&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 535.075461][ T25] audit: type=1800 audit(1628822832.928:129): pid=27381 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=14067 res=0 errno=0 [ 535.102692][T27409] loop1: detected capacity change from 0 to 1051 [ 535.111916][T27410] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 535.114298][T27409] EXT4-fs (loop1): unsupported descriptor size 0 [ 535.132857][ T25] audit: type=1326 audit(1628822832.938:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27396 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0xffff0000 [ 535.162290][T27413] loop4: detected capacity change from 0 to 69632 [ 535.174213][T27413] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 535.195753][ T25] audit: type=1804 audit(1628822832.958:131): pid=27388 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir468337911/syzkaller.Avv6GH/661/bus" dev="sda1" ino=14067 res=1 errno=0 [ 535.336296][ T25] audit: type=1800 audit(1628822832.978:132): pid=27388 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=14067 res=0 errno=0 02:47:15 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:47:15 executing program 5: socket(0x10, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) socket$unix(0x1, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) pselect6(0x40, &(0x7f0000000600), 0x0, &(0x7f0000000780)={0xcd}, &(0x7f0000000000), 0x0) 02:47:15 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffe2}]}) setpgid(0x0, 0x0) 02:47:15 executing program 2: r0 = request_key(&(0x7f00000001c0)='ceph\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080), 0x0, r0) keyctl$invalidate(0x15, r1) request_key(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0xffffffffffffffff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000000c0)='syz0\x00', 0x1ff) 02:47:15 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100), 0x0, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:15 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x3, &(0x7f0000000200)=[{&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 537.778440][T27431] loop1: detected capacity change from 0 to 1051 [ 537.801948][T27436] loop4: detected capacity change from 0 to 69632 [ 537.837127][ T25] audit: type=1326 audit(1628822835.898:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27426 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0xffff0000 [ 537.865432][T27436] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 537.875463][T27431] EXT4-fs (loop1): unsupported descriptor size 0 02:47:15 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xffffffe2}]}) rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) 02:47:15 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, 0x0, 0xff7b) 02:47:16 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:47:16 executing program 3: semop(0x0, &(0x7f0000000180)=[{0x0, 0x80}], 0x1) 02:47:16 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a", 0x10, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:16 executing program 2: syz_mount_image$nfs(0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0xf36e}], 0x0, 0x0) [ 538.024189][ T25] audit: type=1326 audit(1628822836.088:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27446 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0xffff0000 [ 538.098228][T27457] loop4: detected capacity change from 0 to 69632 [ 538.106628][T27460] loop2: detected capacity change from 0 to 243 [ 538.126314][T27457] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 538.134453][T27459] loop1: detected capacity change from 0 to 1051 [ 538.184881][T27459] EXT4-fs (loop1): unsupported descriptor size 0 [ 538.193835][T27460] loop2: detected capacity change from 0 to 243 02:47:18 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:47:18 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0x10, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x5, 0x80, 0x5, 0x84, 0xc8, 0x4, 0x0, 0x0, 0x60008, 0xe, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000003c0), 0x6bc89c152bd1aa60}, 0xa, 0x4, 0x0, 0x4, 0x8000, 0x8b, 0x2, 0x0, 0x4, 0x0, 0x7}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @remote}}, {{0x2, 0x0, @dev}}}, 0x163) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x0, @dev}, {0x2, 0x4e24, @dev}, {0x2, 0xce24, @multicast1}, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x2000000, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="cfde3f2e72d1060000000000"], &(0x7f00000000c0)='.', 0x0, 0x2233080, 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="25f3439c31711c69cbcb2272f4ef39f8983056fe1fc855b2c25e7127205b7d1de39011efd5e85fbb0fcb01aee8657644d59d6bb262f250419a6beeb2d1bdeda81daf1685ba12f355acb66e27a089e6c998e5fdb273285a78323262c73224ca668a815c843663f4b9c39d3c5eba64b09bac46f3893045d4f3dd"], &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f0000000680)={0x7, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}, {{0x2, 0x4e22, @multicast2}}}, 0x108) umount2(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='mountinfo\x00') 02:47:18 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000280), 0x6) io_setup(0x4, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000001a00)=[&(0x7f0000000100)={0x100000000000000, 0x4, 0x0, 0x1, 0x0, r0, &(0x7f0000001a40)="0300ffff", 0x4}]) 02:47:18 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:47:18 executing program 2: openat(0xffffffffffffffff, 0x0, 0x101a02, 0x0) 02:47:18 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a", 0x10, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 540.900476][T27490] loop1: detected capacity change from 0 to 1051 [ 540.933282][T27495] loop4: detected capacity change from 0 to 69632 02:47:19 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) [ 541.004738][T27490] EXT4-fs (loop1): unsupported descriptor size 0 [ 541.014597][T27495] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 02:47:19 executing program 5: semop(0x0, &(0x7f0000000180)=[{0x0, 0x80}, {0x0, 0x0, 0x1000}], 0x2) 02:47:19 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a", 0x10, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:19 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0x10, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x5, 0x80, 0x5, 0x84, 0xc8, 0x4, 0x0, 0x0, 0x60008, 0xe, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000003c0), 0x6bc89c152bd1aa60}, 0xa, 0x4, 0x0, 0x4, 0x8000, 0x8b, 0x2, 0x0, 0x4, 0x0, 0x7}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @remote}}, {{0x2, 0x0, @dev}}}, 0x163) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x0, @dev}, {0x2, 0x4e24, @dev}, {0x2, 0xce24, @multicast1}, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x2000000, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="cfde3f2e72d1060000000000"], &(0x7f00000000c0)='.', 0x0, 0x2233080, 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="25f3439c31711c69cbcb2272f4ef39f8983056fe1fc855b2c25e7127205b7d1de39011efd5e85fbb0fcb01aee8657644d59d6bb262f250419a6beeb2d1bdeda81daf1685ba12f355acb66e27a089e6c998e5fdb273285a78323262c73224ca668a815c843663f4b9c39d3c5eba64b09bac46f3893045d4f3dd"], &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f0000000680)={0x7, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}, {{0x2, 0x4e22, @multicast2}}}, 0x108) umount2(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='mountinfo\x00') 02:47:19 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{0x0, 0x0, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:47:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:47:19 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000001280)={0x67446698, 0x0, 0x0, 0x0, 0x0, "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"}, 0x1001) recvmsg(r0, &(0x7f0000000140)={&(0x7f0000000000)=@ethernet={0x0, @multicast}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000022c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/24, 0x18}], 0x2, &(0x7f0000000100)=""/55, 0x37}, 0x0) [ 541.260580][T27520] loop1: detected capacity change from 0 to 1051 [ 541.288840][T27523] loop4: detected capacity change from 0 to 69632 02:47:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 541.335988][T27520] EXT4-fs (loop1): unsupported descriptor size 0 02:47:19 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) [ 541.378427][T27523] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 02:47:19 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c89", 0x18, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:47:19 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:47:19 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000280)={&(0x7f0000000080)=@xdp, 0x80, &(0x7f0000000140)=[{&(0x7f0000000100)=""/62, 0x3e}], 0x1, &(0x7f0000000180)=""/208, 0xd0}, 0x0) write$nbd(r1, &(0x7f0000001280)={0x67446698, 0x0, 0x0, 0x0, 0x0, "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"}, 0x1001) [ 541.601167][T27550] loop1: detected capacity change from 0 to 1051 [ 541.625825][T27550] EXT4-fs (loop1): unsupported descriptor size 0 [ 541.640324][T27556] loop4: detected capacity change from 0 to 69632 [ 541.656049][T27556] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 02:47:20 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000001280)={0x67446698, 0x0, 0x0, 0x0, 0x0, "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"}, 0xec1) 02:47:20 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:47:20 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0x10, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x5, 0x80, 0x5, 0x84, 0xc8, 0x4, 0x0, 0x0, 0x60008, 0xe, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000003c0), 0x6bc89c152bd1aa60}, 0xa, 0x4, 0x0, 0x4, 0x8000, 0x8b, 0x2, 0x0, 0x4, 0x0, 0x7}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @remote}}, {{0x2, 0x0, @dev}}}, 0x163) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x0, @dev}, {0x2, 0x4e24, @dev}, {0x2, 0xce24, @multicast1}, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x2000000, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="cfde3f2e72d1060000000000"], &(0x7f00000000c0)='.', 0x0, 0x2233080, 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="25f3439c31711c69cbcb2272f4ef39f8983056fe1fc855b2c25e7127205b7d1de39011efd5e85fbb0fcb01aee8657644d59d6bb262f250419a6beeb2d1bdeda81daf1685ba12f355acb66e27a089e6c998e5fdb273285a78323262c73224ca668a815c843663f4b9c39d3c5eba64b09bac46f3893045d4f3dd"], &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f0000000680)={0x7, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}, {{0x2, 0x4e22, @multicast2}}}, 0x108) umount2(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='mountinfo\x00') 02:47:20 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff}) connect$netlink(r0, &(0x7f0000000000), 0xc) 02:47:20 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c89", 0x18, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:20 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 542.192789][T27588] loop1: detected capacity change from 0 to 1051 [ 542.208767][T27587] loop4: detected capacity change from 0 to 69632 [ 542.220733][T27588] EXT4-fs (loop1): unsupported descriptor size 0 02:47:20 executing program 2: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x80002020, 0x0) [ 542.295324][T27587] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 02:47:20 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$int_out(r0, 0x0, 0x0) 02:47:20 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:47:20 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c89", 0x18, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:20 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r0) fcntl$dupfd(r1, 0x406, r2) 02:47:20 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0x10, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x5, 0x80, 0x5, 0x84, 0xc8, 0x4, 0x0, 0x0, 0x60008, 0xe, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x400, 0x1, @perf_bp={&(0x7f00000003c0), 0x6bc89c152bd1aa60}, 0xa, 0x4, 0x0, 0x4, 0x8000, 0x8b, 0x2, 0x0, 0x4, 0x0, 0x7}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @remote}}, {{0x2, 0x0, @dev}}}, 0x163) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x0, @dev}, {0x2, 0x4e24, @dev}, {0x2, 0xce24, @multicast1}, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x2000000, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="cfde3f2e72d1060000000000"], &(0x7f00000000c0)='.', 0x0, 0x2233080, 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="25f3439c31711c69cbcb2272f4ef39f8983056fe1fc855b2c25e7127205b7d1de39011efd5e85fbb0fcb01aee8657644d59d6bb262f250419a6beeb2d1bdeda81daf1685ba12f355acb66e27a089e6c998e5fdb273285a78323262c73224ca668a815c843663f4b9c39d3c5eba64b09bac46f3893045d4f3dd"], &(0x7f0000000380)='.', 0x0, 0x5010, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2b, &(0x7f0000000680)={0x7, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x29}}}, {{0x2, 0x4e22, @multicast2}}}, 0x108) umount2(&(0x7f0000000240)='./file0\x00', 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='mountinfo\x00') 02:47:20 executing program 2: semop(0x0, &(0x7f0000000180)=[{}], 0x1) sysfs$2(0x2, 0x0, &(0x7f0000000100)=""/101) [ 542.524646][T27608] loop1: detected capacity change from 0 to 1051 [ 542.532430][T27609] loop4: detected capacity change from 0 to 69632 [ 542.545305][T27608] EXT4-fs (loop1): unsupported descriptor size 0 [ 542.556987][T27609] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 02:47:23 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:47:23 executing program 5: sysfs$2(0x2, 0x0, &(0x7f0000000100)=""/101) 02:47:23 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) accept4$vsock_stream(r0, 0x0, 0x0, 0x80000) 02:47:23 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045", 0x1c, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:23 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:47:23 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, 0x0, &(0x7f0000000040)) 02:47:23 executing program 2: semop(0x0, &(0x7f0000000180)=[{}, {}], 0x2aaaaaaaaaaaab52) 02:47:23 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000001280)={0x67446698, 0x0, 0x0, 0x0, 0x0, "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"}, 0xfffffef6) [ 545.240262][T27644] loop4: detected capacity change from 0 to 69632 [ 545.253395][T27645] loop1: detected capacity change from 0 to 1051 [ 545.278381][T27644] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 02:47:23 executing program 3: socket(0x0, 0xdb32b0a18d370b2c, 0x0) [ 545.314186][T27645] EXT4-fs (loop1): unsupported descriptor size 0 02:47:23 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:47:23 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045", 0x1c, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:23 executing program 2: select(0x40, &(0x7f0000001c00), 0x0, 0x0, &(0x7f0000001cc0)={0x0, 0x2710}) [ 545.515224][T27671] loop1: detected capacity change from 0 to 1051 [ 545.517241][T27670] loop4: detected capacity change from 0 to 69632 [ 545.532354][T27671] EXT4-fs (loop1): unsupported descriptor size 0 [ 545.552295][T27670] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 02:47:26 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:47:26 executing program 3: semtimedop(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x3938700}) r0 = semget$private(0x0, 0x3, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f00000000c0)=""/64) 02:47:26 executing program 2: semop(0x0, &(0x7f0000000180)=[{0x3}, {0x0, 0x0, 0x1000}], 0x2) 02:47:26 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045", 0x1c, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:26 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf465", 0x33, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:47:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x204500, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) poll(&(0x7f0000000080)=[{r0}, {r1}], 0x2, 0x0) [ 548.352644][T27699] loop4: detected capacity change from 0 to 69632 [ 548.362808][T27701] loop1: detected capacity change from 0 to 1051 02:47:26 executing program 5: syz_mount_image$nfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2280008, &(0x7f0000000800)) 02:47:26 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r1, &(0x7f0000001280)={0x67446698, 0x0, 0x0, 0x0, 0x0, "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"}, 0x1001) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/24, 0x18}], 0x1}, 0x0) 02:47:26 executing program 3: semop(0x0, &(0x7f0000000180)=[{0x0, 0x0, 0x1000}], 0x1) [ 548.402261][T27699] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 548.435876][T27701] EXT4-fs (loop1): unsupported descriptor size 0 02:47:26 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:47:26 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f2800450100", 0x1e, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:26 executing program 5: semop(0x0, &(0x7f0000000180)=[{0x0, 0x0, 0x1000}], 0x1) r0 = semget$private(0x0, 0x1, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) [ 548.625647][T27727] loop4: detected capacity change from 0 to 69632 [ 548.660927][T27730] loop1: detected capacity change from 0 to 1051 [ 548.667653][T27727] EXT4-fs (loop4): invalid first ino: 0 [ 548.687513][T27730] EXT4-fs (loop1): unsupported descriptor size 0 02:47:29 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:47:29 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x800000808d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0xfffffd2d) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x880) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) sendmsg$NL80211_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="4800e800", @ANYRES16=0x0, @ANYBLOB="000129bd7000fddbdf253000000008000300", @ANYRES32, @ANYBLOB="0c009900ff0000004e000000060036000b000000060036000900000006003600160000000600360027000000"], 0x48}, 0x1, 0x0, 0x0, 0x20000005}, 0x8000) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') 02:47:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000009b00)={0x0, 0x0, &(0x7f0000009ac0)={0x0, 0x14}}, 0x0) 02:47:29 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:47:29 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f2800450100", 0x1e, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:29 executing program 5: clock_gettime(0x0, &(0x7f0000000000)) clock_gettime(0x1, &(0x7f0000000040)) 02:47:29 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 551.442445][T27760] loop1: detected capacity change from 0 to 1051 [ 551.449057][T27764] loop4: detected capacity change from 0 to 69632 02:47:29 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000009b00)={0x0, 0x0, &(0x7f0000009ac0)={&(0x7f0000009980)={0x14, 0x0, 0x4}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000006400)=[{{0x0, 0x0, &(0x7f0000001280)=[{&(0x7f00000000c0)=""/205, 0xcd}], 0x1}}], 0x1, 0x12000, &(0x7f0000006580)={0x0, 0x989680}) 02:47:29 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 551.488138][T27760] EXT4-fs (loop1): unsupported descriptor size 0 [ 551.503170][T27764] EXT4-fs (loop4): invalid first ino: 0 02:47:29 executing program 2: syz_mount_image$nfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 02:47:29 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f2800450100", 0x1e, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:29 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 02:47:29 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 551.778664][T27793] loop1: detected capacity change from 0 to 1051 [ 551.791183][T27793] EXT4-fs (loop1): unsupported descriptor size 0 [ 551.808194][T27798] loop4: detected capacity change from 0 to 69632 [ 551.821120][T27798] EXT4-fs (loop4): invalid first ino: 0 02:47:30 executing program 5: creat(&(0x7f0000001a40)='./file0\x00', 0x0) mount(&(0x7f0000000440)=@loop={'/dev/loop', 0x0}, &(0x7f0000000480)='./file0\x00', 0x0, 0xb801, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x100000, 0x0) 02:47:30 executing program 2: openat$incfs(0xffffffffffffff9c, 0x0, 0x12500, 0x0) 02:47:30 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 02:47:30 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r1, 0x0, 0x8, &(0x7f0000000080)=ANY=[@ANYRES64], 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f00000001c0)=0xc) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000009c0)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0xc}}, [@filter_kind_options=@f_bpf={{0x8}, {0xc, 0x2, [@TCA_BPF_FD={0x8}]}}]}, 0x38}}, 0x0) 02:47:30 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:47:30 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 02:47:30 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000240)={0x0, 0x1}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xcb, &(0x7f0000000180), 0xc) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2}, 0xc) [ 552.381558][T27821] loop4: detected capacity change from 0 to 69632 [ 552.388328][T27826] loop1: detected capacity change from 0 to 1051 [ 552.405903][T27826] EXT4-fs (loop1): unsupported descriptor size 0 02:47:30 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x1c5}, {&(0x7f0000000140)=""/85, 0xb8}, {&(0x7f0000000fc0)=""/4096, 0x853}, {&(0x7f0000000400)=""/106, 0x6bc}, {&(0x7f0000000740)=""/73, 0x3b3}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0xa}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 02:47:30 executing program 5: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x374, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x1c5}, {&(0x7f0000000140)=""/85, 0xb8}, {&(0x7f0000000fc0)=""/4096, 0xf2}, {&(0x7f0000000400)=""/106, 0x6bc}, {&(0x7f0000000740)=""/73, 0x3b3}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f00000007c0)=""/154, 0x40d}, {&(0x7f0000000000)=""/22, 0x2}], 0x81, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 02:47:30 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 552.470024][T27821] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 02:47:30 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:47:30 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 552.682884][T27853] loop1: detected capacity change from 0 to 1051 02:47:30 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 552.723291][T27853] EXT4-fs (loop1): unsupported descriptor size 0 [ 552.741372][T27860] loop4: detected capacity change from 0 to 69632 02:47:30 executing program 5: clone(0x41804100, 0x0, 0x0, 0x0, 0x0) 02:47:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000e00)=[@cred], 0x20}, 0x3) 02:47:30 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:30 executing program 2: r0 = openat$tun(0xffffff9c, &(0x7f0000000100), 0x47648c1ad714b321, 0x0) write$tun(r0, 0x0, 0x0) [ 552.822838][T27860] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 02:47:30 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:47:31 executing program 2: openat$bsg(0xffffff9c, &(0x7f0000000240), 0x63e201, 0x0) 02:47:31 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004", 0x5a, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:47:31 executing program 0: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:47:31 executing program 3: syz_emit_ethernet(0x52, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000000000000058100200086dd601b1c7200180600fc"], 0x0) [ 553.031254][T27899] loop1: detected capacity change from 0 to 1051 02:47:31 executing program 5: clone(0x21cc1180, 0x0, 0x0, 0x0, 0x0) [ 553.081699][T27899] EXT4-fs (loop1): unsupported descriptor size 0 [ 553.113084][T27914] loop4: detected capacity change from 0 to 69632 02:47:31 executing program 2: r0 = openat$bsg(0xffffff9c, &(0x7f0000000580), 0x0, 0x0) faccessat(r0, &(0x7f0000000140)='./file0\x00', 0x3) 02:47:31 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x4, &(0x7f0000000540)=[{&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 553.180819][T27914] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 02:47:31 executing program 0: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:47:31 executing program 3: mmap$perf(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x40a5831, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) munlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) 02:47:31 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:47:31 executing program 5: pipe2$9p(0x0, 0x8e000) 02:47:31 executing program 2: unshare(0x2000200) 02:47:31 executing program 0: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 553.344755][T27954] ptrace attach of "/root/syz-executor.0"[27951] was attempted by "/root/syz-executor.0"[27954] 02:47:31 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x9) write$binfmt_aout(r0, 0x0, 0x0) [ 553.405247][T27958] loop1: detected capacity change from 0 to 1051 02:47:31 executing program 5: syz_emit_ethernet(0x62, &(0x7f0000000080)={@broadcast, @empty, @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "1b1c72", 0x2c, 0x6, 0x0, @private0, @private1, {[], @payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) [ 553.470247][T27966] loop4: detected capacity change from 0 to 69632 [ 553.470337][T27958] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 553.502416][T27966] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 02:47:31 executing program 2: syz_emit_ethernet(0x102c, 0x0, 0x0) 02:47:31 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 553.529118][T27971] ptrace attach of "/root/syz-executor.0"[27970] was attempted by "/root/syz-executor.0"[27971] 02:47:31 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:47:31 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x4, &(0x7f0000000540)=[{&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000240)={@rand_addr=' \x01\x00'}, 0x14) 02:47:31 executing program 3: mlock(&(0x7f0000ffb000/0x1000)=nil, 0x1000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) munlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) 02:47:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000001cc0)={&(0x7f0000000940)={0xa, 0x4e24, 0x0, @empty, 0x81}, 0x1c, 0x0}, 0x0) 02:47:31 executing program 3: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) [ 553.734615][T27991] loop4: detected capacity change from 0 to 69632 02:47:31 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:47:31 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f000000a640), 0x0, 0x0) mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x2010, r0, 0x0) [ 553.786957][T27991] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 02:47:31 executing program 2: request_key(&(0x7f0000000640)='dns_resolver\x00', &(0x7f0000000680)={'syz', 0x1}, 0x0, 0x0) [ 553.852448][T28001] loop1: detected capacity change from 0 to 1051 02:47:32 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000", 0x60, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:47:32 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000003d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003c40)=[@rights={{0x18, 0x1, 0x1, [r0, r1]}}], 0x18}, 0x0) [ 553.918668][T28001] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 02:47:32 executing program 5: sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, 0x0, 0x0) 02:47:32 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000011c0)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000017100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 02:47:32 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x4, &(0x7f0000000540)=[{&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 554.064687][T28022] loop4: detected capacity change from 0 to 69632 [ 554.097165][T28022] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 02:47:32 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f000000a640), 0x0, 0x0) mmap$perf(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x40010, r0, 0x0) 02:47:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c) 02:47:32 executing program 2: futex(0x0, 0x8b, 0x0, 0x0, &(0x7f0000000240), 0x0) [ 554.152647][T28033] loop1: detected capacity change from 0 to 1051 02:47:32 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 554.214142][T28033] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 02:47:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:47:32 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x5) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000100)={'batadv_slave_0\x00'}) 02:47:32 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:32 executing program 3: msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/4074) 02:47:32 executing program 2: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) [ 554.385297][T28052] loop4: detected capacity change from 0 to 69632 [ 554.440330][T28052] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 02:47:32 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000680)={0x2, 'macvtap0\x00'}) 02:47:32 executing program 5: pipe(&(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) 02:47:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:47:32 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 554.495667][T28066] loop1: detected capacity change from 0 to 1051 [ 554.516209][T28066] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 02:47:32 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) 02:47:32 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:47:32 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f000000a640), 0x0, 0x0) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) munlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) mlock(&(0x7f0000ff9000/0x2000)=nil, 0x2000) 02:47:32 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/module/block', 0x0, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) 02:47:32 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f000000a300), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) [ 554.734266][T28087] loop4: detected capacity change from 0 to 69632 02:47:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 554.782404][T28089] loop1: detected capacity change from 0 to 1051 [ 554.796877][T28087] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 02:47:32 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x9) sendmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@in6={0xa, 0x4e24, 0x0, @private1}, 0x80, 0x0}, 0x0) 02:47:32 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)={0x20, 0x9, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x20}}, 0x0) [ 554.826575][T28089] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 02:47:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000011c0)={0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:47:33 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f000000a300), 0x0, 0x0) ioctl$RTC_PIE_OFF(r0, 0x7006) 02:47:33 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200", 0x63, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:47:33 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{0x0, 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 555.048933][T28118] loop4: detected capacity change from 0 to 69632 [ 555.063036][T28118] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 02:47:33 executing program 5: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x77359400}) 02:47:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$AUDIT_GET(r0, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x10}, 0xffffffffffffff0d}}, 0x0) 02:47:33 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 555.098258][T28124] loop1: detected capacity change from 0 to 1051 [ 555.112107][T28124] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 02:47:33 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000140)={0x0, 0x42, 0x0}, 0x10100) [ 555.237924][T28138] loop4: detected capacity change from 0 to 69632 [ 555.252933][T28138] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) [ 555.285870][T28142] loop1: detected capacity change from 0 to 1051 [ 555.317188][T28142] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 02:47:35 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:47:35 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:47:35 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:35 executing program 2: mmap$perf(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x1000003, 0x40b1831, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000f74000/0x2000)=nil, 0x2000) 02:47:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000002100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) sendmsg$unix(r1, &(0x7f0000003780)={0x0, 0x0, 0x0}, 0x0) 02:47:35 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r0, &(0x7f00000025c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000001, 0x0) 02:47:36 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={0x0, @phonet, @nl=@unspec, @phonet}) [ 557.978519][T28172] loop4: detected capacity change from 0 to 69632 [ 558.000173][T28174] loop1: detected capacity change from 0 to 1051 02:47:36 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) [ 558.026675][T28174] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 558.040538][T28172] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 02:47:36 executing program 5: msgsnd(0x0, 0x0, 0xc, 0x0) 02:47:36 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000), 0x0, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:36 executing program 2: mmap$perf(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x40a5831, 0xffffffffffffffff, 0x0) 02:47:36 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c2000012", 0x65, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 558.259992][T28200] loop1: detected capacity change from 0 to 1051 [ 558.280493][T28203] loop4: detected capacity change from 0 to 69632 [ 558.293882][T28200] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 558.306347][T28203] EXT4-fs (loop4): fragment/cluster size (65536) != block size (4096) 02:47:39 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:47:39 executing program 3: mmap$perf(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, 0x40a5831, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff7000/0x9000)=nil, 0x9000) 02:47:39 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10000}, 0x1c) 02:47:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_test}) 02:47:39 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:39 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) 02:47:39 executing program 2: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 02:47:39 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x7f}]}) [ 561.052611][T28228] loop4: detected capacity change from 0 to 69632 [ 561.065606][T28227] loop1: detected capacity change from 0 to 1051 02:47:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x2861ffc4}, 0x1c) 02:47:39 executing program 5: pipe2$9p(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREAD(r0, &(0x7f0000006080)={0x1001, 0x75, 0x0, {0xff6, "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"}}, 0x1001) [ 561.119471][T28228] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 561.155170][T28227] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 02:47:39 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, &(0x7f0000000100)) 02:47:39 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 561.344359][T28254] loop4: detected capacity change from 0 to 69632 [ 561.359475][T28254] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 562.557464][ T1372] ieee802154 phy0 wpan0: encryption failed: -22 [ 562.563969][ T1372] ieee802154 phy1 wpan1: encryption failed: -22 02:47:42 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:47:42 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:42 executing program 3: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={0x0, 0x989680}, 0x0) 02:47:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast2}, &(0x7f0000000040)=0x20) 02:47:42 executing program 2: add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "a5d5459844a9475c7b885d35f9905e5bec4cb0070ee80319ec36b3dad75df6f206ce004dc2c2e2c8dcbebb328a6adb9c24485b4f1407d01b36a1f00d9a645d30"}, 0x48, 0xfffffffffffffffb) keyctl$unlink(0x9, 0x0, r0) 02:47:42 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(r0, 0x0, 0x19) [ 564.063715][T28271] loop4: detected capacity change from 0 to 69632 [ 564.075770][T28277] loop1: detected capacity change from 0 to 1051 02:47:42 executing program 2: r0 = getpgid(0x0) r1 = getpgid(0x0) tgkill(r0, r1, 0x20) 02:47:42 executing program 5: openat$cachefiles(0xffffffffffffff9c, &(0x7f00000006c0), 0x44800, 0x0) 02:47:42 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_mreq(r0, 0x29, 0x1, 0x0, &(0x7f0000000400)) [ 564.109858][T28271] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 564.110089][T28277] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 02:47:42 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/module', 0x339102, 0x0) 02:47:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000040)=@abs={0x1}, 0x6e) 02:47:42 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf465", 0x33, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 564.314669][T28303] loop1: detected capacity change from 0 to 1051 [ 564.319033][T28300] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 564.375854][T28303] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 02:47:45 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:47:45 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, 0x0) getdents64(r0, 0x0, 0x19) 02:47:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername(r0, &(0x7f0000000080)=@tipc=@id, &(0x7f0000000100)=0x80) 02:47:45 executing program 2: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) getresgid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)) 02:47:45 executing program 5: recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000004a00), 0xffffffffffffffff) 02:47:45 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000400)={0x14, 0x0, 0x8, 0x301}, 0x14}}, 0x0) [ 567.119659][T28327] loop1: detected capacity change from 0 to 1051 [ 567.123526][T28326] loop4: detected capacity change from 0 to 69632 02:47:45 executing program 3: getrusage(0xffffffffffffffff, &(0x7f0000000140)) [ 567.163218][T28327] EXT4-fs (loop1): invalid first ino: 0 02:47:45 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, 0x0) getdents64(r0, 0x0, 0x19) 02:47:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000003340), 0x9, 0x0, 0x0) 02:47:45 executing program 3: mlock(&(0x7f0000ffb000/0x1000)=nil, 0x1000) munlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) 02:47:45 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 567.315501][T28347] loop1: detected capacity change from 0 to 1051 [ 567.344734][T28355] loop4: detected capacity change from 0 to 69632 [ 567.360909][T28347] EXT4-fs (loop1): invalid first ino: 0 02:47:48 executing program 3: openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x440, 0x0) 02:47:48 executing program 5: pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x0, 0x989680}, 0x0) 02:47:48 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:47:48 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001", 0x4d, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:48 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, 0x0) getdents64(r0, 0x0, 0x19) 02:47:48 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000003780)={0x0, 0x0, &(0x7f00000036c0)=[{&(0x7f0000002080)="c3", 0x1}], 0x1}, 0x0) recvfrom$unix(r0, &(0x7f0000000000)=""/4096, 0x1000, 0x20000020, &(0x7f0000001000)=@file={0x0, './file0\x00'}, 0x6e) 02:47:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x8}, 0x1c) 02:47:48 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000001980)={@private2}) 02:47:48 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_mreq(r0, 0x29, 0xf036109163fe72e2, 0x0, &(0x7f0000000140)) [ 570.270428][T28385] loop1: detected capacity change from 0 to 1051 [ 570.276500][T28387] loop4: detected capacity change from 0 to 69632 02:47:48 executing program 2: socket$inet6(0xa, 0x0, 0x63a1) [ 570.311228][T28385] EXT4-fs (loop1): invalid first ino: 0 02:47:48 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:48 executing program 5: request_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0) 02:47:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(0xffffffffffffffff, 0x0, 0x19) 02:47:48 executing program 2: pipe(&(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000001640)) [ 570.509700][T28411] loop1: detected capacity change from 0 to 1051 [ 570.539846][T28416] loop4: detected capacity change from 0 to 69632 [ 570.544138][T28411] EXT4-fs (loop1): fragment/cluster size (16384) != block size (1024) [ 570.591258][T28416] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 02:47:51 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:47:51 executing program 5: socket$inet6(0xa, 0x3, 0x81) 02:47:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) accept$unix(r0, 0x0, 0x0) 02:47:51 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(0xffffffffffffffff, 0x0, 0x19) 02:47:51 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) add_key(&(0x7f0000000040)='rxrpc\x00', 0x0, 0x0, 0x0, r1) 02:47:51 executing program 2: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000003380), 0x80400, 0x0) socket$nl_audit(0x10, 0x3, 0x9) [ 573.339285][T28451] loop1: detected capacity change from 0 to 1051 [ 573.351453][T28453] loop4: detected capacity change from 0 to 69632 02:47:51 executing program 3: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) 02:47:51 executing program 5: syz_emit_ethernet(0x102c, &(0x7f00000002c0)=ANY=[], 0x0) [ 573.398877][T28451] EXT4-fs (loop1): fragment/cluster size (16384) != block size (1024) [ 573.423194][T28453] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 02:47:51 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:51 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000540)={0xec4, 0x3, 0x9, 0x303, 0x0, 0x0, {}, [@nested={0x8d, 0x0, 0x0, 0x1, [@generic="5e0855f462c5784eb1a12cafd2a1fefe905b8527107a0f9a17bfac11ef8cb8d15a2cbb8f55dfce5695fa2205f3968ef32971a9ff6f71e5a572d4316093ea58332f67b6ae48f4709e8fb31a7bd7db57433ffcbe5983c392612672948526a3a4f260db320335ac659daa36ad5ab1e96b9e6ab22c4c1ad8e321ea055c8936b65f0b73b6f326fda38e34d8"]}, @nested={0x281, 0x0, 0x0, 0x1, [@typed={0xa, 0x0, 0x0, 0x0, @str='$\x9d)\\\x10\x00'}, @typed={0x14, 0x0, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @generic="d8068a7700e6d56192ed88a6751ae3ca44ba593a56fa3f0669ce1503dddd8e53f8125f2b2b7dba001b56f51f94652fec2bac79b2471d459cd09f76b0abfef13d240915a3e5447cdc7141764ece98a5a469453746f1e3250c32329020d35518dc6a03e8cd8b75119f0bf4c6ab087980c82495db9ff0", @typed={0x3d, 0x0, 0x0, 0x0, @binary="28cd42e4da9e916df885a1a0ecf7a9acfca2c29f076ff4d553461325671ae6ef70fd78fe7a5d212ee09273d9d2faef12c181a1ac9b61dd8409"}, @generic="7164db61532acad249a4804949483d2f6026f1e9e31a7a4c1233572d2c52ddd595aec5b7239d8e160a7d2a8c4e67cd80bd74cdec0304873464116dcc58b953f86abf75ae4b9836ee5e66dfecfbfbe97fc7c2a193fc1cd4637fd1f70a503e2d473db48837d593f5581d378c23ef264e797f338e130aa434ab22bfbba4440a5fcd50637ef1d6a78d0025f395ffe1387edbcea70d9daabc769583faea2aae3866fac04f6dcb1abc4c2ee1c6c6cb8447089e8614aa05321099f30a5ef462", @generic="272ad49f92e60364bc4dee74e0c4adf88b2f8a92bb338c40be1cca26a09e7d532fd40c1cd1391e2fa1e742d2ccf6c146a27ec6dd465410574433d32802ccfb6b991231f286510d350ee59db6d12ace3a846aba584bffe2dee44d2080d88d8844fb88e3ea844b0a8c0fd138d6fb1f8c2d10d9ca5a2b54cdd33b71bc66952bb819faccd84db00dee09e4be9ac8ccd7cc70471e686203e324e49f0c9b38d613bd0f814e7d9b90ebe01acffbc91e0279f19a761d28522396355a750075909d7689754ebffe215ea11020b1a0e8c5353a3fe5d0b6aa9f3ee1778ea8bfe18c9474ba3e0953ce8ee2fe3da9fe3cf815"]}, @nested={0xa9, 0x0, 0x0, 0x1, [@generic="1f7d5a68cab19264064d668e129ec4234f05cc68d972f2e52fb6a3db6df8ed661de9b60d2f14ce0f97a4ceb70cea63cc4407c38b75c5f042dd6b50bfc1bb98eba861c42f700a3befe55f041eef3b4ca9caf1914639", @generic="76d4e9c6c81cd605c15f096251ad9e33ea9050d76aefc06dd03735409e4a83f1f33fe0df55e55d3d16067b9e0e51c8d58876fcb4cee596398f1bcbdb7b6d84e8", @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@broadcast}, @typed={0x8, 0x0, 0x0, 0x0, @pid}]}, @nested={0xaed, 0x0, 0x0, 0x1, [@generic="8688861d33b1ff4b431a0f6eff7e530f7de49e27c9b919bc1bd9957246db9036b43dfc9bb2b9eb38ede468d1c02b4f6da2", @typed={0x4}, @generic="ff5da8fa64eb971de5e0ba2f88f7e76335fbb5dd0c6ef4d5f646fa57b06708bb35d929f39c0445c8980c92444fc465730a634c755392c3b1893875fd65d84e16d68266a0f97e0d34449461bd2159c02e971e3fd5", @typed={0x8, 0x0, 0x0, 0x0, @ipv4=@multicast1}, @generic="56b8f22f3c0fbbb772874875e145a0df888367864d6b1aa39cf2ee357c57a7985759c7e0e5549a3ddd1e295c591cf1bcb6d9bdb766ad29eb997113037d48147f89c86b97463f1b6576aa5a976d89dda51954441fb0b7750c764ac6c40a05f86b359a248f638f898ccdf02adea69a8d1ac9fcd67e16bc660d66ad4107ed2d9522f32e0dbfc429eab7fe2fa1a3198469c61a4dbcf300758ee25b58055dd466aeafdccf3efcf92860e2a283bb135bb5c48c1904a0db7d7deafeaa6ad5a0b254c641efdf98b16baadf0dc373876cc91b3f3c7ba03a3730", @typed={0x8, 0x0, 0x0, 0x0, @uid=0xee01}, @typed={0xc, 0x0, 0x0, 0x0, @u64}, @generic="b792504a63f9ba438ff94fe48580bd3bb1f278317341804f81a85dea06eafbff6dca9432311088c7eae632b39746a5eee9398bd21ed7bd3a393da00aa0ff2f072108619d25247f43c4e11a8ff3aeaea62631f30b80640fb521566e5da507751579e227cbc3e4710eb6cf1f84589edca94d2cd12c4028e0f3e944cf2b6c32258cd2bd5a149168b622c1738750b5ef5b34f14a359c01b2ee4b93d54c80e0b38601277142b649ee7c57ff36bf0fafe094526e18627f683289bf6049fa24c292692b0ad8460cb40fd033140edbfcd0f97b8e09fd696c6e825dc8740bf8463b16c10070221f8207782a5f090bf75ba856858dc36f1c591048f1a4db9394d9d2313af2951716c1c54c866089df3976656fd127891bc84bff4105293765ef96dedc3124436c27525b66de84954a406a7c4b39c065e0d4f77ea6641a8b9b6f6a2995ac7e3c00100d39bed03c486d82346b5d2088c850a07fdcfb2f9081bdf4879cf6ce397fb21c53e0d61d01e45e652a15178fbd8b5a27c7ab4c67d895043b3927f490cbdfca8378c59782a7d3ce996a6849514fe92bda4cd0484173da2820b13b4e606f376e93491b8a7a59e3d91567e6565de09894fb1f5b6343c077b0ed351b262a5b17781e5bea9eccae4ec4d984b09082930ab072d4267e0ca6b22aca410a36a7bd96f62bff8e61b16a873934e3fe394663a48aa7884922c5e6530a81853e04af8bea97d5cb08ed182fa1d5bbf5bb75b4f506f0ccda4edf50263b075c23750fdaa6c73c708e8dee219edba20fcfa3a150b8910c88678fd60718bcc5a42a4e787e49f19b8a149b69663b9f428cd882f3796f95a01d622eaeb09390de18c27d9b00d81b189a0379973ebf89d0a179075a317f2bf8e48f9561269fa942496c141017fc87208d59d7331351bec7b8d280cce27a046a9da14f82d1bbe573d93a69985172574bc90070508b0555f5b71360eaf487a12b7a13ae2b3f9caf5137ba6f5b6cd6c3bf60be04cd71f990963445d3f8cf7887e8a55e83cb91b5f21eef46b7d61c555165c5043ddda1cd193a7a7f31666a9807cc922cb27dad4440d4ba1496843a6dd4e640f177c679c51c12193166d2561da44d163efd92ac78799cfa7e8724a1bfcd4dfd81ea1e12643516032d1df19de3a431a8de11eab796a9d4e94ae665a2c1dbb08f8fdfb9351124b3204d81d40542b80ef59b5d8c0e42ce341b5f0abce60e86ab62e2aeb40e3a73c9547d314ec289f4e3639a457fc1762479668056397e75ec534b3ff573e6bbeaeaadc5b84ed07ddc5c170b003b4e9fed2e31e1682c4b1f7a1478d66020bf192967a844978a2019c2f8cba6fb9fe00cc3497d540a2e23743abd7e5be9cc2c24fb157c4cd2ff19f831eb870b0b6ba507fdcbd05b3964c4af420b616bf5067364838b88588f082506812cb1954c7e507cf63aecb6cd92d5a2079a15aeb72dd6901e553ca06bf465d202cf069c54ba86f1750a473557902d6d95c2a901dcc940fb3d5220ab0e09b8ab7040222400f6c5c58e00580d64c4ae33dacf31373fc3553fcfdeb7e7842cc8464b8339d9b1a59f881ba6395e51305ff0d98edafe8875bbaf188a29d7d4bfb2ecff5386b0c2ffdb4a41d0edca8c0cf58ac66472f089661d9c1934480a22a7f1108274bada16fd8ba2808e15fb3e3697c2186770b3756676ede17a07b3d5e19ce0c09777a78511b44ff8412a25e097633c315dfc443d3a5e6add64c385ae3cae4e6d1e4c13bc106bd6664482915deafca118be445e3f1ebd64cfb59e50281cdec819dfadb1eec7c158d85cc5f2f0e07a7d514a2c21e6d884a572ae4e4ca0c21976cd81aec4d9f6c986e25510abfcd7cb2892638e0a69c6b41788a9501b2d2709b5563b202ccd6e7f32192c98d7812b5f0a1035445f01a1c4de00097f8974ce5cb6ff6cfbe3b4ed08951389f24e6cbe999d2d8c74b19f2b6abc9b35d89f31a84d033ef0ccd79035ee354b1208b0fc757e803afcd470cfd464116144fd0abb2af09abc6f4283db40fcc770037f2e6fc468cdc012039a934c0eb056a1db96cf44784fd10d02ce3f83a94521fcd91170bbf0228c227a255c944b27194dbf5c74a221571f95f741c3feb183e344e519be2db19aa2b85e4286a2cb55c1130a3adf2e67d8fd30ca449a8dbdaa930097067d733b59dd92b60dd2ade1eac080a15d7c11fa3d761cf027c1c7e547eff002587bc43653344cdc9790051bc59b5fa2e3ab15cffc13196f99760ecdb2e35804897ff2d64bc0b7a6163340d203bea28528dfa731e036c2cb90dd521eba19ecbf4d1b49716350151ab3108b7d26eb502a5d42d1919c6d3328c96b261ddfc7e36a2f305f15e3c5e7f2a9a0d1302b886cbd17bab421eec05c21d466949af311b95261cf6a5eca69eda782473080cba528eb035a380ab450faebb53f33d5295790002dc62f3452deab0b8b43fb32c1cf4bd3aed022a8ef7612d33c2538de8cf707174b686a2de8bb918580a7e19bcab82c4e07c0b03d340e5c93743f12454ce4d60f487176f07f406ee33fab117b9f249ab46ce81954fbf154393b1f86fcd92ceaa682f5e04d2c9b72612e622031c2abb275b1952913a372815f99a8fcdc82091df0ffcda7b6e7bb5877aeb833739d6881a92da65ebbf02b6d6894ddf499ab60849476095a25832b62e3b16861f891686738601035c03fe5fedaf4a9da11607bfcfb26340df923fffc3e9190203da58817fe98573a156c1ee614bf172003495821433f4219bf322404bb22762a739afc9143c6302b205e3765d05b6f4fc59454987657c2f4d63740c5ab8ae1a9f0705e2f3031d514337342aa829cc031307dd4d8fbd0234fa2e2ec4a82a31189493fd1f511d3765904e957fe1561c1a3a80cce385bbdcb297dfe4612f627c04dc39cedbf6cde8ceac6c28d423c23c354569d9bfeab2428d83ce01e6b7a96cf6aae1526eb471b2517376dc193b3242d13a4150690cc34df47c3b55cd0c3e63c73519d961357cf2d3480b418869d123c76de069dff8827a1e2b79883e17b3a41bfdf592c01e2118803989ba01c8aa5784da9e7816bc0b3244688f58bc2966bf9c59fadbf1edfa63c040a0d3c6f96b4a05ed220fe8da17d8a2e86d523c4fc47ffea23c2ebdd4923e774faf5f4ef94997595e48d86bcdf5e10a28f71735118e1e7ed75b1e47ff5b8285391436b688f17b0fe88b853c95e6191ebf8f95b3453236df05cb8e992efb584453e623e0d1fe837ac7c5af82457e13dd4236dd6fe805c91426e4e34b93bb6f5d6ddcef831c8365b95771a2cedec330dc13ca46e98cd7f1ef51626e86fac7c47d1c7b2f3f2a89fceadf6a61c3e37af8552fff3fe47145a06c9de5c4254988de41d7bd212ef4502f881bf3674a55bc8461eb3c022fbc64823b71503a0526c7041f5de"]}]}, 0xec4}}, 0x0) [ 573.503435][T28475] loop1: detected capacity change from 0 to 1051 [ 573.519225][T28475] EXT4-fs (loop1): fragment/cluster size (16384) != block size (1024) 02:47:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x2200000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="000000000001000000000000e2aa000000000000846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000000680)="ed41000010001200000004008000000000000800050000000af301000400000000000000000001000900000010", 0x2d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) getdents64(0xffffffffffffffff, 0x0, 0x19) [ 573.726455][T28484] loop4: detected capacity change from 0 to 69632 [ 573.744654][T28484] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 02:47:54 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:47:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(r0, 0x29, 0x0, 0x0, 0x0) 02:47:54 executing program 2: mmap$perf(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x1000003, 0x40a5831, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) munlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) remap_file_pages(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) 02:47:54 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:54 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000004540)={@local, @loopback, @private0, 0x0, 0x0, 0x0, 0x100}) 02:47:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$AUDIT_GET(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 02:47:54 executing program 4: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) msgget(0x2, 0x0) msgget(0x0, 0x0) 02:47:54 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000540)={0x14, 0x0, 0x1, 0x3}, 0x14}}, 0x0) 02:47:54 executing program 2: clone(0x28105380, 0x0, 0x0, 0x0, 0x0) 02:47:54 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000001100)={0x1, &(0x7f00000010c0)=[{0x2}]}) [ 576.470238][T28516] loop1: detected capacity change from 0 to 1051 02:47:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000880)=@security={'security\x00', 0xe, 0x4, 0x408, 0xffffffff, 0xd8, 0x1d8, 0x0, 0xffffffff, 0xffffffff, 0x338, 0x338, 0x338, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, [], [], 'gretap0\x00', 'geneve1\x00'}, 0x0, 0xa8, 0xd8}, @common=@unspec=@CONNMARK={0x30}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @remote}, @private1, [], [], 'ip_vti0\x00', 'veth1_macvtap\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@common=@hl={{0x28}}]}, @common=@inet=@SET2={0x30}}, {{@uncond, 0x0, 0x138, 0x160, 0x0, {}, [@common=@eui64={{0x28}}, @common=@unspec=@physdev={{0x68}, {'ip6gre0\x00', {}, 'team0\x00'}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffd}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x468) [ 576.535461][T28516] EXT4-fs (loop1): fragment/cluster size (16384) != block size (1024) 02:47:54 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001340)) 02:47:57 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:47:57 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:47:57 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$sock_int(r0, 0x1, 0x1d, &(0x7f0000000000), 0x4) 02:47:57 executing program 3: mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x100000b, 0x40a5831, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) munlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) remap_file_pages(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) 02:47:57 executing program 5: syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000001f00)='ns/net\x00') 02:47:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f00000020c0)={0x0, 0x0, &(0x7f0000002080)={0x0}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_SPLIT(r1, &(0x7f0000003400)={0x0, 0x0, &(0x7f00000033c0)={0x0}}, 0x0) 02:47:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$unix(r1, &(0x7f0000005f00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000005e00)=[@rights={{0x18, 0x1, 0x1, [r0, r2]}}, @rights={{0x10}}], 0x28}, 0x0) 02:47:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) 02:47:57 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x44, 0x0, 0x1, 0x101, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x2c, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @empty}}}]}, @CTA_LABELS={0x4}]}, 0x44}}, 0x0) 02:47:57 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x40, 0x0, 0x0) [ 579.558650][T28562] loop1: detected capacity change from 0 to 1051 [ 579.597000][T28562] EXT4-fs (loop1): fragment/cluster size (16384) != block size (1024) 02:47:57 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:47:57 executing program 3: sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x40) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f000000a300), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) 02:48:00 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:48:00 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f000000a300), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 02:48:00 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000", 0x60, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:48:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$AUDIT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x10}, 0x10}}, 0x0) 02:48:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$AUDIT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x10}, 0x10}}, 0x0) recvmsg$unix(r1, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) 02:48:00 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) 02:48:00 executing program 2: sendmsg$unix(0xffffffffffffffff, 0x0, 0x2c66150d9ecebe8f) [ 582.589066][T28606] loop1: detected capacity change from 0 to 1051 02:48:00 executing program 4: mmap$perf(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x40a5831, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 02:48:00 executing program 3: mmap$perf(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x0, 0x40a5831, 0xffffffffffffffff, 0x0) [ 582.639431][T28606] EXT4-fs (loop1): fragment/cluster size (16384) != block size (1024) 02:48:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000011c0)={0xffffffffffffffff}) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000001180)=@buf={0x0, &(0x7f0000000180)}) 02:48:00 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:48:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f00000007c0)={&(0x7f0000000500), 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 582.838463][T28632] loop1: detected capacity change from 0 to 1051 [ 582.894974][T28632] EXT4-fs (loop1): fragment/cluster size (16384) != block size (1024) 02:48:03 executing program 3: bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0xfffffdb4) 02:48:03 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:48:03 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) 02:48:03 executing program 2: request_key(&(0x7f00000003c0)='id_resolver\x00', &(0x7f0000000000)={'syz', 0x2}, &(0x7f0000000080)='\x00', 0xfffffffffffffffd) 02:48:03 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000500)=ANY=[], 0x20) 02:48:03 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:48:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) pselect6(0x40, &(0x7f0000002dc0)={0x1f}, 0x0, 0x0, 0x0, 0x0) 02:48:03 executing program 3: socket(0x10, 0x3, 0x2e) 02:48:03 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000004540)={@local, @loopback, @private0, 0x0, 0x1ff}) [ 585.686883][T28656] loop1: detected capacity change from 0 to 1051 [ 585.726745][T28656] EXT4-fs (loop1): fragment/cluster size (16384) != block size (1024) 02:48:03 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200", 0x63, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:48:03 executing program 5: unshare(0xd0a8f455569eaf67) 02:48:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'wlan0\x00', 0x0}) 02:48:03 executing program 2: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, r1) [ 585.877598][T28677] loop1: detected capacity change from 0 to 1051 [ 585.918469][T28677] EXT4-fs (loop1): fragment/cluster size (16384) != block size (1024) 02:48:06 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:48:06 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 02:48:06 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f000000a300), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x1c}}) 02:48:06 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:48:06 executing program 2: waitid(0x0, 0xffffffffffffffff, 0x0, 0x40000000, 0x0) 02:48:06 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f000000a300), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x81}}) [ 588.770375][T28710] loop1: detected capacity change from 0 to 1051 02:48:06 executing program 2: request_key(&(0x7f0000000980)='big_key\x00', &(0x7f00000009c0)={'syz', 0x1}, 0x0, 0xfffffffffffffff9) 02:48:06 executing program 4: msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000380)=""/129) 02:48:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x0, 0x0, 0x0, 0xa}, &(0x7f0000000040)=0x20) 02:48:06 executing program 3: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) [ 588.811649][T28710] EXT4-fs (loop1): fragment/cluster size (16384) != block size (1024) 02:48:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x3f0, 0xffffffff, 0x1a8, 0x0, 0x1a8, 0xffffffff, 0xffffffff, 0x320, 0x320, 0x320, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x6, 0x4}}}, {{@uncond, 0x0, 0xa8, 0xd8}, @common=@inet=@SET2={0x30}}, {{@uncond, 0x0, 0x138, 0x178, 0x0, {}, [@common=@eui64={{0x28}}, @common=@inet=@iprange={{0x68}, {@ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @ipv4=@remote, @ipv6=@mcast2, @ipv6=@private1}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x450) 02:48:07 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) [ 588.986596][T28734] x_tables: duplicate underflow at hook 2 [ 589.012100][T28735] loop1: detected capacity change from 0 to 1051 [ 589.033388][T28735] EXT4-fs (loop1): fragment/cluster size (16384) != block size (1024) 02:48:09 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:48:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000011c0)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000012c00)=[{{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0) 02:48:09 executing program 4: mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) mlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 02:48:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) 02:48:09 executing program 2: pselect6(0x40, &(0x7f0000000000)={0x2}, &(0x7f0000000040)={0x4}, 0x0, &(0x7f0000000200)={0x77359400}, &(0x7f0000000180)={&(0x7f0000000140)={[0xa0]}, 0x8}) 02:48:09 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d242000012", 0x65, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:48:09 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mlock(&(0x7f0000ffb000/0x1000)=nil, 0x1000) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) [ 591.871747][T28761] loop1: detected capacity change from 0 to 1051 02:48:09 executing program 3: mmap$perf(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x40a5831, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x10000) 02:48:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000002540)={&(0x7f0000002180)={0x10, 0x0, 0x0, 0x282c4df6243f2734}, 0xc, &(0x7f0000002500)={&(0x7f00000021c0)={0x14}, 0x14}}, 0x0) 02:48:10 executing program 4: r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000100)=@profile={'stack ', ':\'.\x00'}, 0xa) [ 591.913905][T28761] EXT4-fs (loop1): fragment/cluster size (16384) != block size (1024) 02:48:10 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:48:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 592.109245][T28784] loop1: detected capacity change from 0 to 1051 [ 592.121631][T28784] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 02:48:12 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) sendto$unix(r0, 0x0, 0x0, 0x200088d1, 0x0, 0x0) 02:48:12 executing program 3: arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000100)) 02:48:12 executing program 4: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) pipe(&(0x7f0000004700)) 02:48:12 executing program 5: mmap$perf(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4, 0x40a5831, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mlock(&(0x7f0000ffb000/0x1000)=nil, 0x1000) 02:48:12 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:48:12 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:48:13 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "a5d5459844a9475c7b885d35f9905e5bec4cb0070ee80319ec36b3dad75df6f206ce004dc2c2e2c8dcbebb328a6adb9c24485b4f1407d01b36a1f00d9a645d30"}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "a5d5459844a9475c7b885d35f9905e5bec4cb0070ee80319ec36b3dad75df6f206ce004dc2c2e2c8dcbebb328a6adb9c24485b4f1407d01b36a1f00d9a645d30"}, 0x48, 0xfffffffffffffffb) keyctl$search(0xa, r0, &(0x7f0000000040)='blacklist\x00', &(0x7f0000000080)={'syz', 0x0}, r1) 02:48:13 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000001cc0)={&(0x7f0000000940)={0xa, 0x4e24, 0x0, @empty, 0x81}, 0x1c, 0x0, 0x0, &(0x7f0000001c00)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x800}}, @dstopts_2292={{0x18}}], 0x30}, 0x0) 02:48:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$AUDIT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x10}, 0x10}}, 0x0) recvmsg$unix(r1, &(0x7f0000000500)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f00000001c0)=""/247, 0xf7}, {0x0}], 0x2, &(0x7f00000004c0)}, 0x2020) 02:48:13 executing program 5: mmap$perf(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x40a5831, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0xfffffffffffffffc, 0x0) [ 594.973381][T28813] loop1: detected capacity change from 0 to 1051 [ 595.008368][T28813] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 02:48:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$AUDIT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x40c5) 02:48:13 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, &(0x7f0000000180)) 02:48:13 executing program 2: pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RMKNOD(r0, &(0x7f0000000080)={0x14}, 0x14) 02:48:13 executing program 3: msgsnd(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="1b"], 0xc, 0x0) 02:48:13 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x9) recvfrom(r0, 0x0, 0x0, 0x40, 0x0, 0x0) [ 595.211918][T28841] loop1: detected capacity change from 0 to 1051 [ 595.242348][T28841] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 02:48:16 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:48:16 executing program 4: r0 = getpid() sched_rr_get_interval(r0, &(0x7f0000000000)) 02:48:16 executing program 2: keyctl$reject(0x13, 0x0, 0x0, 0x489, 0x0) 02:48:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000001cc0)={&(0x7f0000000940)={0xa, 0x4e24, 0x0, @empty, 0x81}, 0x1c, &(0x7f0000001bc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000001c00)=[@hoplimit_2292={{0x14}}], 0x18}, 0x0) 02:48:16 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={@mcast2, @remote, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}) 02:48:16 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x0, &(0x7f0000000180)) 02:48:16 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000001cc0)={&(0x7f0000000940)={0xa, 0x4e24, 0x0, @empty, 0x81}, 0x1c, &(0x7f0000001bc0)=[{0x0}, {0x0}], 0x2, &(0x7f0000001c00)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x800}}, @dstopts_2292={{0x18}}], 0x30}, 0x0) [ 598.003389][T28871] loop1: detected capacity change from 0 to 1051 02:48:16 executing program 4: setrlimit(0x0, &(0x7f0000000000)={0x9}) 02:48:16 executing program 3: recvmsg$unix(0xffffffffffffffff, 0x0, 0x80002100) [ 598.059712][T28871] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 02:48:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$inet6(r0, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x4881) [ 598.101835][T28871] EXT4-fs (loop1): group descriptors corrupted! 02:48:16 executing program 2: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x5}, 0x0, 0x0, &(0x7f00000001c0)={0x0}) 02:48:16 executing program 3: mmap$perf(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x40a5831, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) munlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) 02:48:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:48:19 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x0, &(0x7f0000000180)) 02:48:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)=@abs, 0x6e) 02:48:19 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@security={'security\x00', 0xe, 0x4, 0x3a0, 0xffffffff, 0x2d0, 0x1b8, 0xd0, 0xffffffff, 0xffffffff, 0x2d0, 0x2d0, 0x2d0, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28}}, {{@ipv6={@private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', [], [], 'ip6gre0\x00', 'macsec0\x00'}, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "bd9ede175f5ea3ff9db70b6f4baa7f8577c686a4f0d64869f3b1bd35f6b2"}}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private1, [], [], 'ip6_vti0\x00', 'vxcan1\x00'}, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@dst={{0x48}}]}, @common=@inet=@SET1={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x400) 02:48:19 executing program 2: mmap$perf(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x1000003, 0x40a5831, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) mlock(&(0x7f0000e24000/0x3000)=nil, 0x3000) 02:48:19 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x1c) 02:48:19 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0xa, 0x6, 0x101}, 0x14}}, 0x0) 02:48:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 601.054341][T28915] x_tables: duplicate underflow at hook 2 [ 601.092407][T28919] loop1: detected capacity change from 0 to 1051 02:48:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[], 0x2b4}}, 0x0) 02:48:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001f80)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, &(0x7f0000002100)=@ethernet={0x0, @dev}, &(0x7f0000001fc0)=0x80) 02:48:19 executing program 2: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000080)={0x28, r0, 0x300, 0x0, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x8, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8}]}]}, 0x28}}, 0x4008) syz_genetlink_get_family_id$tipc2(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_SET_QOS_MAP(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000840), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0xc805) 02:48:19 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, 0x0) [ 601.160020][T28919] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 601.181217][T28919] EXT4-fs (loop1): group descriptors corrupted! 02:48:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:48:19 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x0, &(0x7f0000000180)) 02:48:19 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func]}}, &(0x7f00000002c0)=""/239, 0x26, 0xef, 0x1}, 0x20) 02:48:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, 0x0, &(0x7f0000000540)) 02:48:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000003340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2022, 0x0) 02:48:19 executing program 5: mmap$perf(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x40a5831, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) munlock(&(0x7f0000ffb000/0x1000)=nil, 0x1000) 02:48:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:48:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:48:19 executing program 4: futex(&(0x7f00000000c0)=0x1, 0x8b, 0x1, &(0x7f00000001c0), 0x0, 0x0) 02:48:19 executing program 5: accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x400) [ 601.417324][T28955] loop1: detected capacity change from 0 to 1051 02:48:19 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x6, 0x16, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 02:48:19 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) 02:48:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 601.461137][T28955] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 601.480610][T28955] EXT4-fs (loop1): group descriptors corrupted! 02:48:19 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, 0x0) 02:48:19 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_TX_POWER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x28}}, 0x0) 02:48:19 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x2f, 0x0, 0x0) [ 601.665292][T28986] loop1: detected capacity change from 0 to 1051 02:48:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bridge_slave={{0x11}, {0xc, 0x5, 0x0, 0x1, [@IFLA_BRPORT_STATE={0x5}]}}}]}, 0x44}, 0x1, 0x4c000000}, 0x0) 02:48:20 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:48:20 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003080)={0x0, 0xf4240, &(0x7f0000008180)=ANY=[], &(0x7f0000001bc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:48:20 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x6, 0x17, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 02:48:20 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x3, 0x0, 0x0) 02:48:20 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, 0x0) [ 602.310513][T29017] loop1: detected capacity change from 0 to 1051 02:48:20 executing program 3: r0 = socket(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000002640)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000280)="f4", 0x1}], 0x1}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 02:48:20 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003080)={0x1c, 0x3, 0x0, &(0x7f0000001bc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 602.377462][T29021] bridge0: port 2(bridge_slave_1) entered disabled state 02:48:20 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x8360c, 0x5, &(0x7f0000000540)=[{&(0x7f0000010000)="2000000000020000190000006001030f0f0000d4000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {0x0}], 0x81, 0x0) [ 602.420622][T29021] bridge0: port 2(bridge_slave_1) entered blocking state [ 602.427779][T29021] bridge0: port 2(bridge_slave_1) entered forwarding state 02:48:20 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x8, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 02:48:20 executing program 3: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) 02:48:20 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xa, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 02:48:20 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x6, 0xd, 0x0, 0x0) [ 602.615741][T29035] loop1: detected capacity change from 0 to 1051 02:48:23 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:48:23 executing program 4: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_dccp_int(r0, 0x21, 0x0, 0x0, 0x0) 02:48:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)={0x28, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x28}}, 0x0) 02:48:23 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x29, 0x0, 0x0) 02:48:23 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x6, 0x6, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 02:48:23 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x6, 0x21, 0x0, 0x0) 02:48:23 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x5, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 02:48:23 executing program 2: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x80000002, 0x0) 02:48:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xc, [@func={0xb}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f00000002c0)=""/239, 0x30, 0xef, 0x1}, 0x20) 02:48:23 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) accept$alg(r0, 0x0, 0x0) 02:48:23 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_TX_POWER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x24}}, 0x0) 02:48:23 executing program 1: r0 = socket$phonet(0x23, 0x2, 0x1) ioctl$SIOCPNDELRESOURCE(r0, 0x89ef, &(0x7f0000001c80)=0xffffffff) 02:48:26 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:48:26 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) 02:48:26 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x12, 0x0, 0x0) 02:48:26 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f00000002c0)) 02:48:26 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x31, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 02:48:26 executing program 1: r0 = socket(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000002640)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000280)="f4", 0x1}], 0x1}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8, 0xb}, @void}}}, 0x24}}, 0x0) 02:48:26 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x6, 0x14, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 02:48:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240), 0xffffffffffffffff) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, r1, 0x1, 0x0, 0x0, {{}, {}, {0xc, 0x14, 'syz1\x00'}}}, 0x28}}, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, 0x0, 0x0) 02:48:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0x8, 0x2001}, @void}}}, 0x1c}}, 0x0) 02:48:26 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) recvmmsg$unix(r0, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 02:48:26 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x300, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@osf={{0x50}, {'syz1\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0xc, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x360) 02:48:26 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x5, 0x0, 0x0) 02:48:29 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:48:29 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x1a, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 02:48:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)={0x20, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x20}}, 0x0) 02:48:29 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x6, 0x25, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 02:48:29 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@ldst={0x6, 0x0, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x3e0, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x76}, 0x48) 02:48:29 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x17, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) [ 611.418847][T29140] TCP: TCP_TX_DELAY enabled 02:48:29 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x302, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@osf={{0x50}, {'syz1\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x360) 02:48:29 executing program 1: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) 02:48:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0x8, 0x2}, @void}}, [@NL80211_ATTR_WIPHY={0x8}]}, 0x24}}, 0x0) 02:48:29 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x6, 0x2, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 02:48:29 executing program 4: r0 = socket$phonet(0x23, 0x2, 0x1) ioctl$SIOCPNDELRESOURCE(r0, 0x89ef, &(0x7f0000001c80)) 02:48:29 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x7, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 02:48:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:48:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0xa, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) 02:48:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0x8, 0xe}, @void}}}, 0x1c}}, 0x0) 02:48:32 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x18, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 02:48:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r1, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'batadv_slave_0\x00'}]}, 0x28}}, 0x0) 02:48:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b00010062726964676500000c0002000500070005"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000010000104fd0004000000008000000000", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) 02:48:32 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000280)={0x0}, 0x20) 02:48:32 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8931, &(0x7f0000000040)={'wlan0\x00'}) 02:48:32 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x12, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 02:48:32 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_TX_POWER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x30, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x30}}, 0x0) [ 614.621712][T29185] bridge1: port 1(team0) entered blocking state [ 614.643915][T29185] bridge1: port 1(team0) entered disabled state [ 614.666190][T29185] device team_slave_0 entered promiscuous mode 02:48:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x1, 0x0, 0x0, {0x3}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x30, 0x10, 0x1, 0x0, 0x0, {0x3}, [@IFLA_MASTER={0x8, 0xd}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 614.672459][T29185] device team_slave_1 entered promiscuous mode [ 614.716772][T29198] device team_slave_0 left promiscuous mode [ 614.722795][T29198] device team_slave_1 left promiscuous mode 02:48:32 executing program 1: pipe(0xfffffffffffffffd) [ 614.760426][T29198] bridge1: port 1(team0) entered disabled state [ 614.844310][T29204] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 614.857809][T29204] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 614.867503][T29204] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 614.919784][T29207] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 614.929440][T29207] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 614.939393][T29207] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 614.989380][T29204] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 615.014590][T29204] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 615.023662][T29204] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 615.057182][T29207] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 615.066824][T29207] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 615.090469][T29207] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 02:48:35 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:48:35 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x12, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 02:48:35 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$alg(r1, &(0x7f00000000c0)=[{0x0, 0xff00, 0x0}], 0x1, 0x0) 02:48:35 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b00010062726964676500000c0002000500070005"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000010000104fd0004000000008000000000", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) 02:48:35 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000280)={0x0, 0x0, 0x800}, 0x20) 02:48:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b00010062726964676500000c0002000500070005"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000010000104fd0004000000008000000000", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) 02:48:35 executing program 2: socketpair(0x15, 0x5, 0x5, &(0x7f0000000300)) 02:48:35 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003080)={0x19, 0x3, 0x0, &(0x7f0000001bc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:48:35 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xc, 0x0, 0x0) [ 617.704215][T29242] bridge2: port 1(team0) entered blocking state [ 617.719902][T29242] bridge2: port 1(team0) entered disabled state 02:48:35 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x29, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 02:48:35 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f00000007c0)='syzkaller\x00', 0x7ff, 0xe4, &(0x7f0000000800)=""/228, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 617.745491][T29242] device team_slave_0 entered promiscuous mode [ 617.751754][T29242] device team_slave_1 entered promiscuous mode 02:48:35 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x6, 0x3, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) [ 617.812524][T29236] device team_slave_0 left promiscuous mode [ 617.818524][T29236] device team_slave_1 left promiscuous mode [ 617.854376][T29236] bridge2: port 1(team0) entered disabled state 02:48:38 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@ptr]}, {0x0, [0x0]}}, 0x0, 0x27}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:48:38 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x300, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0xc0, 0xe0, 0x0, {}, [@common=@osf={{0x50}, {'syz1\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x360) 02:48:38 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8946, &(0x7f0000000040)={'wlan0\x00'}) 02:48:38 executing program 3: socketpair(0x10, 0x2, 0x1, &(0x7f0000000000)) 02:48:38 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x6, 0x11, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 02:48:38 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400000000ec00000000000000", @ANYRES32=r6, @ANYBLOB="00000000000000001c0012000b00010062726964676500000c0002000500070005"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000010000104fd0004000000008000000000", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r6], 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x0, 0x0, 0xc, r6}}, 0x20}}, 0x0) 02:48:38 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8922, &(0x7f0000000040)={'wlan0\x00'}) 02:48:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 02:48:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}]}]}, 0x20}}, 0x0) [ 620.755070][T29279] bridge2: port 1(team0) entered blocking state [ 620.764671][T29279] bridge2: port 1(team0) entered disabled state [ 620.784858][T29279] device team_slave_0 entered promiscuous mode [ 620.791117][T29279] device team_slave_1 entered promiscuous mode 02:48:38 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, &(0x7f0000003080)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:48:38 executing program 1: socket$inet(0x14, 0x0, 0x0) [ 620.818296][T29289] wlan0: mtu less than device minimum [ 620.824240][T29292] device team_slave_0 left promiscuous mode [ 620.830293][T29292] device team_slave_1 left promiscuous mode [ 620.848157][T29292] bridge2: port 1(team0) entered disabled state 02:48:38 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xf, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 02:48:41 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@ptr]}, {0x0, [0x0]}}, 0x0, 0x27}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:48:41 executing program 2: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$IPT_SO_SET_REPLACE(r0, 0x6, 0x40, 0x0, 0x0) 02:48:41 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$sock_int(r1, 0x1, 0x28, &(0x7f0000000040)=0x8, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='wlan0\x00', 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000070, 0x0) 02:48:41 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0x8, 0x8}, @void}}}, 0x1c}}, 0x0) 02:48:41 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x20000920, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@osf={{0x50}, {'syz1\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x360) 02:48:41 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) [ 623.783728][T29321] netlink: 'syz-executor.3': attribute type 8 has an invalid length. 02:48:41 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) accept4(r0, 0x0, 0x0, 0x1000) 02:48:41 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x17, 0x0, 0x0) 02:48:41 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x2a, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 02:48:41 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) ioctl$TUNGETDEVNETNS(r0, 0x894c, 0x0) [ 623.840698][T29328] netlink: 'syz-executor.3': attribute type 8 has an invalid length. 02:48:42 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) recvmmsg$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000003f00)) 02:48:42 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x6, 0x40, 0x0, 0x0) [ 624.001367][ T1372] ieee802154 phy0 wpan0: encryption failed: -22 [ 624.007866][ T1372] ieee802154 phy1 wpan1: encryption failed: -22 02:48:44 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@ptr]}, {0x0, [0x0]}}, 0x0, 0x27}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:48:44 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)={0x1c, r1, 0x1, 0x0, 0x0, {{0x7e}, {@void, @val={0x8}, @void}}}, 0x1c}}, 0x0) 02:48:44 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003080)={0x0, 0xf4240, 0x0, &(0x7f0000001bc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:48:44 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8929, &(0x7f0000000040)={'wlan0\x00'}) 02:48:44 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003080)={0x1e, 0x3, 0x0, &(0x7f0000001bc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:48:44 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x6, 0x19, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 02:48:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0x3}, @void}}}, 0x1c}}, 0x0) 02:48:45 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8924, &(0x7f0000000040)={'wlan0\x00'}) [ 626.872201][T29361] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 626.911282][T29361] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 02:48:45 executing program 2: pipe(&(0x7f0000003ec0)={0xffffffffffffffff}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003f80)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000040)=@raw=[@exit], &(0x7f0000000080)='syzkaller\x00', 0x1, 0x8b, &(0x7f00000000c0)=""/139, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000003f00), 0x8, 0x10, 0x0}, 0x78) [ 626.977191][T29370] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 02:48:45 executing program 4: futex(&(0x7f0000000180), 0xa, 0x0, 0x0, 0x0, 0x2) 02:48:45 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) [ 627.017842][T29375] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 02:48:45 executing program 3: socketpair(0xf, 0x0, 0x0, &(0x7f0000000200)) [ 627.087518][T29382] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 627.125229][T29382] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 02:48:47 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@ptr, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x7b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:48:47 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x8911, &(0x7f0000000000)) 02:48:47 executing program 4: unshare(0xe000000) unshare(0x8000000) 02:48:47 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_TX_POWER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x0) 02:48:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xa) write$binfmt_aout(r0, &(0x7f00000005c0)={{0x0, 0x0, 0xff}, "", ['\x00']}, 0x120) 02:48:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 02:48:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)={0x18, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0x4}]}, 0x18}}, 0x0) 02:48:48 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x6, 0xd, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 02:48:48 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x890d, 0x0) 02:48:48 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x300, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@osf={{0x50}, {'syz1\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x360) 02:48:48 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x6, 0x13, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 02:48:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1, 0x0, 0x0, {0x6}}, 0x14}}, 0x0) 02:48:51 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@ptr, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x7b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:48:51 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003080)={0x15, 0x3, 0x0, &(0x7f0000001bc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:48:51 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) 02:48:51 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) recvmsg$kcm(r0, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x2) 02:48:51 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x15, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 02:48:51 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_TX_POWER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 02:48:51 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x2c, 0xa, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x2c}}, 0x0) 02:48:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) 02:48:51 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) write$binfmt_elf64(r0, 0x0, 0x0) 02:48:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000001c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r2}]}, 0x24}}, 0x0) 02:48:51 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000001080)={'netpci0\x00'}) 02:48:51 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00'}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="648f6675cd706c8a15b5971361d9", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000cc0)={{{@in=@private, @in=@dev}}, {{@in=@empty}, 0x0, @in6=@empty}}, 0x0) 02:48:54 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@ptr, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x7b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:48:54 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 02:48:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x2, 0x4) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r0) 02:48:54 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) recvmsg$can_j1939(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x2) 02:48:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)={0x34, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x34}}, 0x0) 02:48:54 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000380), 0x4) 02:48:54 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, 0x40000000}, 0x40) 02:48:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000001c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x24, r1, 0x1, 0x0, 0x0, {{0x7}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r2}]}, 0x24}}, 0x0) 02:48:54 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) pselect6(0x40, &(0x7f0000000440)={0x8}, 0x0, 0x0, 0x0, 0x0) 02:48:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@GTPA_VERSION={0x8}]}, 0x1c}}, 0x0) 02:48:54 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xc, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 02:48:54 executing program 2: bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000140)="0000000062c9a4d66da29ad4b7bb1a75b40a3400", &(0x7f0000000040)=""/150}, 0xfcae) 02:48:57 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@ptr, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x7b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:48:57 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xb, &(0x7f0000000000), &(0x7f0000000080)=0x4) 02:48:57 executing program 5: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x6, 0xe, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 02:48:57 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)={0x1c, r1, 0x1, 0x0, 0x0, {{0x1a}, {@void, @val={0x8}, @void}}}, 0x1c}}, 0x0) 02:48:57 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_TX_POWER(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x30, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x30}}, 0x0) 02:48:57 executing program 4: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x2, 0x40, 0x0, 0xfffffffffffffee1) 02:48:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@void, @val={0x8}, @void}}}, 0x1c}}, 0x0) 02:48:57 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xd, &(0x7f0000003080)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 02:48:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="0100000000000000000031000000080010009945"], 0x1c}}, 0x0) 02:48:57 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x22, &(0x7f00000005c0)=@security={'security\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0x248, 0x120, 0x248, 0xffffffff, 0xffffffff, 0x328, 0x328, 0x328, 0xffffffff, 0x4, 0x0, {[{{@ip={@local, @dev, 0x0, 0x0, 'netpci0\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f8c3fb359c91"}}}, {{@ip={@multicast1, @private, 0x0, 0x0, 'ipvlan1\x00', 'ip6tnl0\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "e91300a30db989bdaa20ae1a3163abad1e25f16ff00b2f8c51c78a153c70"}}}, {{@ip={@empty, @multicast2, 0x0, 0x0, 'veth0_to_batadv\x00', 'veth1_to_bond\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@TCPMSS={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x310) 02:48:57 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xa, 0x0, 0x0) 02:48:57 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) accept4(r0, 0x0, 0x0, 0x0) [ 639.331022][T29554] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 639.355280][T29560] netlink: 'syz-executor.4': attribute type 16 has an invalid length. 02:49:00 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@ptr, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x7b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:49:00 executing program 1: pipe(&(0x7f0000000580)) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) 02:49:00 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x2a, 0x0, 0x0) 02:49:00 executing program 5: pipe(&(0x7f0000000580)) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) 02:49:00 executing program 3: r0 = semget(0x3, 0x0, 0x0) semctl$SEM_STAT_ANY(r0, 0x0, 0x14, &(0x7f0000000000)=""/151) 02:49:00 executing program 4: memfd_create(&(0x7f0000000000)=']\x00', 0x2) 02:49:00 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc020660b, 0x0) 02:49:00 executing program 4: getrandom(&(0x7f00000003c0)=""/219, 0xdb, 0x0) 02:49:00 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB="850000002a00000095"], &(0x7f0000000000)='GPL\x00', 0x4, 0x9c, &(0x7f00000002c0)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_mark_inode_dirty\x00', r0}, 0x10) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) 02:49:00 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB="850000002a00000095"], &(0x7f0000000000)='GPL\x00', 0x4, 0x9c, &(0x7f00000002c0)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_mark_inode_dirty\x00', r0}, 0x10) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r2, r1, 0x0, 0x1000000, 0x0}, 0x30) 02:49:00 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r0, 0x40383d03, &(0x7f0000000000)) 02:49:00 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x12, &(0x7f0000001080)={0x0}, 0x10) 02:49:03 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@ptr, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x7b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:49:03 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@fscache}]}}) 02:49:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000180)={'batadv_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000080)=@ipv6_getaddrlabel={0x1c, 0x4a, 0x1, 0x0, 0x0, {0xa, 0x0, 0x80, 0x0, r2}}, 0x1c}}, 0x0) 02:49:03 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB="850000002a00000095"], &(0x7f0000000000)='GPL\x00', 0x4, 0x9c, &(0x7f00000002c0)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_mark_inode_dirty\x00', r0}, 0x10) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, r1, 0x0, 0x1, &(0x7f0000000100)='\x00'}, 0x30) 02:49:03 executing program 1: rt_sigprocmask(0x2, &(0x7f0000000780)={[0x3]}, 0x0, 0x8) 02:49:03 executing program 3: socketpair(0xf, 0x0, 0x0, &(0x7f00000001c0)) 02:49:03 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r0, 0x80045505, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:49:03 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc4c03d09, 0x0) 02:49:03 executing program 1: r0 = socket(0x1000000010, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@ipv4_getnexthop={0x18, 0x6a, 0x74b9dba7ed67d935, 0x0, 0x0, {0x2, 0x2}}, 0x18}}, 0x0) 02:49:03 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0xe, &(0x7f0000001080)={0x0}, 0x10) 02:49:03 executing program 1: r0 = socket(0x1000000010, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@ipv4_getnexthop={0x18, 0x6a, 0x74b9dba7ed67d935, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x2}}, 0x18}}, 0x0) 02:49:03 executing program 2: r0 = gettid() wait4(r0, &(0x7f0000000000), 0x80000000, &(0x7f00000000c0)) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="232107000000000000003ccdd9b3"], 0x191) fsetxattr$trusted_overlay_nlink(r1, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) close(r1) clone(0x43240500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 02:49:06 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@ptr, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x7b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:49:06 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001140)={0xffffffffffffffff, &(0x7f0000000040)="84", 0x0}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r0, &(0x7f0000000040)}, 0x20) 02:49:06 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r0, 0x80045505, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:49:06 executing program 4: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) userfaultfd(0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x8, 0x0, 0x0, &(0x7f00000000c0)={0xb308}, &(0x7f0000000100)={0x0, 0x3938700}, &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) 02:49:06 executing program 1: r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdirat(r0, &(0x7f0000000180)='./file0/file0\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000140)='./file0/file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x2) 02:49:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8992, &(0x7f0000000000)={'bond_slave_1\x00', @ifru_hwaddr=@random}) 02:49:06 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000001c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000200)) 02:49:06 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f0000000540)) 02:49:06 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r0, 0x80045505, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:49:06 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x0) r1 = socket(0x2, 0x3, 0x5) dup3(r1, r0, 0x0) 02:49:06 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB="850000002a00000095"], &(0x7f0000000000)='GPL\x00', 0x4, 0x9c, &(0x7f00000002c0)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_mark_inode_dirty\x00', r0}, 0x10) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) connect(r1, &(0x7f0000000100)=@pptp={0x18, 0x2, {0x2, @broadcast}}, 0x80) 02:49:06 executing program 5: inotify_init1(0x400) 02:49:09 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@ptr, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x7b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:49:09 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000007c0), 0xffffffffffffffff) 02:49:09 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_CONTROL(r0, 0x80045505, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 02:49:09 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x0) r1 = socket(0x2, 0x3, 0x5) dup3(r1, r0, 0x0) 02:49:09 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x0) r1 = socket(0x2, 0x3, 0x5) dup3(r1, r0, 0x0) 02:49:09 executing program 1: r0 = socket(0x1000000010, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@ipv4_getnexthop={0x18, 0x66, 0x74b9dba7ed67d935, 0x0, 0x0, {0x2, 0x2}}, 0x18}}, 0x0) 02:49:09 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001140)={r0, &(0x7f0000000040), 0x0}, 0x20) 02:49:09 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x0) r1 = socket(0x2, 0x3, 0x5) dup3(r1, r0, 0x0) 02:49:09 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x0) r1 = socket(0x2, 0x3, 0x5) dup3(r1, r0, 0x0) 02:49:09 executing program 3: r0 = socket(0x1000000010, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@ipv4_getnexthop={0x18, 0x6a, 0x74b9dba7ed67d935, 0x0, 0x0, {0x2, 0x0, 0x2}}, 0x18}}, 0x0) 02:49:09 executing program 4: r0 = socket(0x1000000010, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@ipv4_getnexthop={0x20, 0x68, 0x74b9dba7ed67d935, 0x0, 0x0, {}, [@NHA_MASTER={0x8}]}, 0x20}}, 0x0) 02:49:09 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f00000001c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0xa6858) 02:49:12 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@ptr, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x7b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:49:12 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x0) r1 = socket(0x2, 0x3, 0x5) dup3(r1, r0, 0x0) 02:49:12 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x0) r1 = socket(0x2, 0x3, 0x5) dup3(r1, r0, 0x0) 02:49:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000002900)=[{{0x0, 0x0, &(0x7f0000002740)=[{0x0}, {&(0x7f0000000180)=""/192, 0xc0}], 0x2}}], 0x1, 0x0, 0x0) recvmmsg$unix(r1, &(0x7f0000001600)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd34}}, {{&(0x7f0000000080)=@abs, 0x0, &(0x7f00000014c0), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="ccc5004f63c08a4c834c670000000000140000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="00000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00008000"]}}], 0x65, 0x0, 0x0) sendmsg$unix(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000380)='9', 0x1}], 0x1}, 0x0) 02:49:12 executing program 3: r0 = socket(0x1000000010, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@ipv4_getnexthop={0x20, 0x6a, 0x74b9dba7ed67d935, 0x0, 0x0, {}, [@NHA_OIF={0x8, 0xb}]}, 0x20}}, 0x0) 02:49:12 executing program 1: openat$pfkey(0xffffffffffffff9c, 0x0, 0x501000, 0x0) 02:49:12 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000005280), 0x0, 0x0) r1 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r1, r0, 0x0, 0x0, 0x0}, 0x30) 02:49:12 executing program 3: syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={0x0}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000500)={'wpan4\x00'}) sendmsg$NL802154_CMD_SET_LBT_MODE(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000740), 0x8000, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000007c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, 0x0, 0x0) 02:49:12 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)=""/216) 02:49:12 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f00000006c0), 0x418002, 0x0) 02:49:12 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_IOCTL(r0, 0x8004550f, &(0x7f0000000080)) 02:49:12 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB="850000002a00000095"], &(0x7f0000000000)='GPL\x00', 0x4, 0x9c, &(0x7f00000002c0)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r0}, 0x10) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140)={0x3}, 0x8) 02:49:15 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@ptr, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x7b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:49:15 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x3, 0x4, 0x4, 0x1, 0x10, 0x1}, 0x40) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000100)={r0, 0x0}, 0x20) 02:49:15 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x7, 0x0, 0x0) 02:49:15 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_IOCTL(r0, 0x8004550f, &(0x7f0000000080)) 02:49:15 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x23, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='f2fs_get_victim\x00'}, 0x10) 02:49:15 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x15, r0, 0xfffffffffffffffb) 02:49:15 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x40) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000080)="1f", &(0x7f00000000c0)=""/40}, 0x20) 02:49:15 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_IOCTL(r0, 0x8004550f, &(0x7f0000000080)) 02:49:15 executing program 5: syz_open_dev$usbmon(&(0x7f0000000000), 0x3f, 0x0) 02:49:15 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0xc0189436, 0x0) 02:49:15 executing program 3: r0 = socket(0x1000000010, 0x80002, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@ipv4_getnexthop={0x28, 0x6a, 0x74b9dba7ed67d935, 0x0, 0x0, {}, [@NHA_OIF={0xb}, @NHA_MASTER={0x8}]}, 0x28}}, 0x0) 02:49:15 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4000000000000073, 0x68001) ioctl$USBDEVFS_IOCTL(r0, 0x8004550f, &(0x7f0000000080)) [ 657.766348][T29837] netlink: 'syz-executor.3': attribute type 5 has an invalid length. 02:49:18 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@ptr, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x7b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:49:18 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001980)={r0, &(0x7f0000001840)="1d", &(0x7f0000001940)=@tcp6}, 0x20) 02:49:18 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001080)={&(0x7f0000001040)='erofs_lookup\x00'}, 0x20001090) 02:49:18 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x367943, 0x0) 02:49:18 executing program 3: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:49:18 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x8, &(0x7f0000001080)={0x0}, 0x10) 02:49:18 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) recvmsg$unix(r0, &(0x7f0000000c80)={0x0, 0x0, 0xffffffffffffffff}, 0x0) 02:49:18 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0xd, 0x0, 0x0) 02:49:18 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_TIME_STAMP(r0, 0x0, 0x3, &(0x7f0000000040)=0x8, 0x4) 02:49:18 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_SYS_OFFSET_PRECISE(r0, 0x4b49, 0x0) 02:49:18 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000005280), 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140), 0x101040, 0x0) 02:49:18 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000140), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, 0x0) 02:49:21 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@ptr, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x7b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:49:21 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0xd, &(0x7f0000001080)={0x0}, 0x10) 02:49:21 executing program 2: rt_sigprocmask(0x0, &(0x7f0000000780)={[0x3]}, &(0x7f0000000900), 0x8) 02:49:21 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x16, &(0x7f0000001080)={0x0}, 0x10) 02:49:21 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000340)) 02:49:21 executing program 3: syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={0x0}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 02:49:21 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB="850000002a00000095"], &(0x7f0000000000)='GPL\x00', 0x4, 0x9c, &(0x7f00000002c0)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_mark_inode_dirty\x00', r0}, 0x10) r2 = gettid() perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x23, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r2, r1, 0x0, 0x0, 0x0}, 0x30) 02:49:21 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000340)={0x0, 0x0, {0x1, 0x0, 0x0, 0x0, 0x2}}) 02:49:21 executing program 4: recvmsg$unix(0xffffffffffffffff, 0x0, 0x80012002) 02:49:21 executing program 2: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x3938700}, &(0x7f0000000200)={&(0x7f00000001c0), 0x8}) 02:49:21 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="2e00000010008108040f9becdb4cb92e0a48b1371400000068bd6efb2503eaff0d000100020200ff050005001201", 0x2e}], 0x1}, 0x0) 02:49:21 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000980)="b0ff02c66b0d698cb89e2fe088ca1f74ffff10000000630677fbac14040ce0", 0x0, 0x0, 0xe8030000, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 663.895248][T29918] device batadv0 entered promiscuous mode 02:49:24 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\xfe') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(r1) 02:49:24 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xb2, 0x0, &(0x7f0000000000)=0x4) 02:49:24 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, 0x0, 0xf0ff7f00000000) 02:49:24 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@ptr, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x7b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:49:24 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000180)={&(0x7f00000000c0), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x2, 0x3, 0x101, 0x0, 0x0, {0x2, 0x0, 0x40}, [@NFQA_CFG_MASK={0xfffffff5, 0x4, 0x1, 0x0, 0x5}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0xd}]}, 0x24}, 0x1, 0x0, 0x0, 0x4050000}, 0x40c0) 02:49:24 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\xfe') close(r1) 02:49:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x30, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc}]}]}, 0x30}}, 0x0) [ 666.815225][T29948] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 02:49:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x3f) getsockname$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3800000010000507000200b5a55b7d0a9b8a5400", @ANYRES32=r4, @ANYBLOB="19000016010000001800120008000100736974000c000200080003", @ANYRES32=r5], 0x38}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=@ipv6_newaddr={0x2c, 0x14, 0x121, 0x0, 0x0, {0xa, 0x40, 0x0, 0x0, r5}, [@IFA_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@ipv6_newaddr={0x34, 0x14, 0x121, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00'}, @IFA_FLAGS={0x8, 0x8, 0x308}]}, 0x34}}, 0x0) 02:49:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005004113", @ANYRES32=r5, @ANYBLOB="00000000ffffffff00000000090001006866736300000000080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newtfilter={0x48, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0x4}}, [@filter_kind_options=@f_rsvp6={{0xa}, {0x18, 0x2, [@TCA_RSVP_DST={0x14, 0x2, @local}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB='h\x00\x00\x00,\x00\'\r\x00'/20, @ANYRES32=r5, @ANYBLOB], 0x68}}, 0x0) 02:49:25 executing program 5: socketpair(0x28, 0x1, 0x0, &(0x7f0000001800)) [ 666.953111][T29975] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 02:49:25 executing program 4: bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012400c000100626f6e64000000000c00020008"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001000250800000000000000000a000000", @ANYRES32=r5, @ANYBLOB="10"], 0x2c}}, 0x0) [ 667.007285][T29975] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.3'. 02:49:25 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r0, &(0x7f0000000380)={0x2, 0x0, @private=0xa010102}, 0x10) 02:49:25 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xe, 0x0, &(0x7f0000000000)=0x4) 02:49:25 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\xfe') close(r1) [ 667.064058][T29975] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 667.088030][T29998] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.3'. [ 667.092486][T30000] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.3'. [ 667.154066][T30001] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 667.211502][T30001] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 667.221542][T30041] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 02:49:27 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@ptr, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x7b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:49:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x38, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}]}, 0x38}}, 0x0) 02:49:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$inet(r0, &(0x7f0000000940)={&(0x7f00000002c0)={0x2, 0x0, @empty}, 0x10, &(0x7f00000009c0)=[{0x0}, {0x0}, {&(0x7f0000000540)="f6d14af0870a64e52b2d28e5e3dcee42729699bd162bc6ebc4734b9030efc5cb5306c8b45144edc685c7494b87f818118d8b2449a6a173799787b3e192ed6408e39f39389b5ad7f6e4619032d545d2f4f9a0c78d5c9d4d15ebe5552b1a98a9e338c43c8737c0a3fda6472ce8845ef72ed7dfe221cff10f79fa432dd4e04022b247ffee1970b6ff46d2a188129087944f57584e02aca4bfad87440f152de46f71", 0xa0}, {&(0x7f0000000740)="5796afe7899d0c58287c4898138f6966458b6abc7b1104b8603327cfb228fc221d043346896349f0013a08b7a7009448d8986575a53ccd322a493225c67b85f92cb13ade419010df0075ab711b73f16657ce06310cd07a632e04f9537db8678841f3e41cfcf8ce165afd68ee81a2f700ef598b4eb0954810d7533824ec", 0x7d}, {&(0x7f0000000800)}], 0x5, &(0x7f0000000a80)=[@ip_tos_int={{0x14}}, @ip_tos_int={{0x14}}], 0x30}, 0x8841) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x11, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000140)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x2d, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x8c) r2 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat$mice(0xffffffffffffff9c, 0x0, 0x41) getpeername$llc(r3, &(0x7f0000000b40), &(0x7f0000001380)=0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x25, 0x0, &(0x7f0000000980)="b0ff02c66b0d698cb89e2fe088ca1f74ffff10000000630677fbac14140ce005c80d46647b", 0x0, 0x2f, 0xe8030000, 0x0, 0x0, 0x0, 0x0}, 0x48) 02:49:27 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x801, 0x0) write$rfkill(r0, &(0x7f0000000080)={0x0, 0x0, 0x3, 0x1}, 0x8) 02:49:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001400)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}]}}}]}, 0x38}}, 0x0) 02:49:27 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92304f242b416ae9eeefc0e9c60ebab1c176bfdbb4dde984510c82dc2b938189a7ca02f732e4c2eab72bf40c0682fd0a0c4ac106b29e220dc28dac72599456d4c4e6f3fe2d1dee18f638ac947b5e026a3287684ab8373bb4df9d72876ef3834293812e927c01c7da1322da44c7f2ed1084a12f56d1cb39df9858037458a4ca037604007600b6be484e4c9517af216bd8ed42f7dd5adb8e49f4a94608c9a20819e02cc22e6be45574d4ed88b37ab8d7674c644dca2f1b4d745fd95c41f9dfc1adafd1e5a3e7f2e898961cb43e438c4e41ae43ea118e14ffffffffe4b8a80366ce5401ec61921a1b529cc8b99bffffb1ac006c67767b03b95151aeb89e6d4a43c625aa228504e4afd8c1cc3eb215ba22f43115f4d39dc7beedb130d9f2be90133a4500000058b8c9370634060105baa664953514605fba3973aa021945b985a8a66e0200000057033815717b4fdbe55b37cb8d7f41aacfbd4089ea1bd22440f64909a09b5a759a703e71f358e11ac8e13db15d792e604a4f279b3bd6621bdf2c17bc0400000000000000ff8d01006200607a9a76e5d9656a7154c75773902a1bdf399df3925130312d095e9c1f973d091c198c1a11edb6b3cc425fe203d2f2655a76865c2c34e2470fcfb1248c0add5431a7fbcb0ef4f66a09af93a09fab1daae4b518d7a5d95a017864487367d6d7ee7bb0749cacf56cf27409c60fca2e0004000000000000a9cb6f4a78444986f9b1ab61f9dab530388eb1f43d4abbfc59d6d1b18fe380df4bf024f120bd715d82033f2fb7d8fc9e0d77b294e097e293db7f002c0024ab2fd8e5e7fb178f047ba32548b4d32972cba6f49051cec1bf6f16231bbb90a2d201a5a47811a2278a03bf7700b06fa191ebd3a0c2ef0058ffebd7cc4cf81f74a7cdac01d998c24f34a5ba9a4a2039d0416e3f81074192c48c63c7d8e94a27a06a4e3d9acee835fd63384f52b8eeb70571e5bbb3e6d2b5eba505000000968981811f832d064048c0e0bbe46984f1f0d0504255c22ee8674053d0e160e525536edf56a93d0a7e6f0889f4ee8964875fea6ff57ba6ae25c5e8ca4f78d5a01308243b08f1caa46be5244d64f8e875857f083144c642f71cdc8e5634c1360c056430f677ee7ed7ac1f9743786b2fb8e0fcfcc3d36c93230b7b059bc295aa0e38b1c3edc3492b96e73d2060acfd8145e4a5851bc4d6fdc5ad939d7795f3879baa88bd194d48e50c84892c97c800d116b059a718351620b846e31ce0b8ef953de70ea860b74a0f3c3dc11177b11cc2e62a95f1ecf607a8dc38e525f415a1bd46b38845ebca04061bacbf627f7975fe599678fee48f83b5989543729e3600000000bc86cd51704f309130f5347413776a7b7bea3c46c0c4c4b7c27c45057d95ac85a41cdcee8e6fa31f7d2137ed1fb4b21c13b9a2c5e3f7c9ef9c45a35adbf0b9312be95264cb4a82bc080de1f87808d0711dd76f2977ca7f2684bfa5c14a0cd6f1f561e34e4e8e51e81d4a355a7d00d917c16a2bb0cfb284fcfde9015769b9ee2c8ff10e934847604d930f62924d0562ce17f6dadf5053ed8f33092a41bb46e1878c5295fecc27f9c6d1f62da58c00020000000000009aa38a05e70591d5cdab1c268ef3c1984c7c0a566cfc2ab6e6fbc99ec206a54fb49056a555414178ef00d8b8f3c59f01eb5d83415994efcc6ec4b3c275cd6b1b5ff82ef7d7abb1d218e7a1d0afa285706841aac9ccc89df41c39dd58dd70569dde45f8ad62edc65828fbb6e279f745d2872f0208635e465ca443a6a64c7803760880af23fb3f430a5d11fffc96dd1cb951642f1433f65b4e170a62a5f7a8d0f9d5cef0d17289c43d4aee2127f7a343899434594cc23e1c864164e130754b337e560f285dc670a31241bf657babf0615b85dc200a10294b7d5885b43ac62fc7f97a85586168483427072a535f2cac81ec261c00f725de74e48d9a86f7d4a5d28d56ce6d571661dccad7ca6d961f525f799b4517141fc98af0673b8296f867eca1ec07be11bc497a6f7d2b752bcf77c2908b64630ed5a0c2261bc2d5de6ee174534b8dfc0432ab6bbcf296d36807544aa7c3d3301fe227b713a371414c98695e559f9cbf6b046184064a5f24a4cc6f41f21fc24a3ad7d20a89e00a9dc99a40f890869d35fba3ce6f29c661d322ba21c65badf55d1859ea7eabc5717a781f83292a3337d4dddc97f31390bb2addd4581f9e7ef3e2693b46a8fc85be061ce79aa2832c04dc04db8b6536123b24be2ef80eb06b2db900fb30596c1574bda31f81d61ccfd58080d2330b947b87b5d17d48c32daffead3414b91603e250eeedc7d65675bca9037426f643797be3e93da96b5643d3feed0b7c885d247c6b830d7cbf3152f27522f5142dcc84a9e48a07518f0142167abf5d6685d09945cbc778bcc3e7dcfac497bc1389a3bafc0d3b51b5a34ab9e5746ae5364ecb6ad9168040388c7640bfa2f886c259718543de7eebf4da8d1c3e76daace5217761d933d06bbe9609fcf5971aa1e77c3123910e72daaadd8878ad4a8eabaf78a96012a4ada1a9cd217fb2a0da2d521454ea9e8fcd3b5badfd6fd1d13a71345b841d04a02bf44195df032c59608a555bc44873272812e0fb874618a0b56b4cf44990f600000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000980)="b0ff02c66b0d698cb89e2fe088ca1f74ffff10000000630677fbac04140ce0", 0x0, 0x2f, 0xe8030000, 0x0, 0x0, 0x0, 0x0}, 0x48) 02:49:28 executing program 2: r0 = syz_io_uring_setup(0xb0e, &(0x7f0000000000), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000001380)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1) 02:49:28 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xc7, 0x0, &(0x7f0000000000)=0x4) 02:49:28 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xa7, 0x0, &(0x7f0000000000)=0x4) 02:49:28 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e002030029000505d25a80648c63940d0424fc60100011400a000000013582c137153e370848018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 02:49:28 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) 02:49:28 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x4) [ 670.221770][T30109] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 670.268528][T30109] netlink: 178868 bytes leftover after parsing attributes in process `syz-executor.2'. 02:49:31 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@ptr, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x7b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:49:31 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x4) 02:49:31 executing program 5: creat(&(0x7f0000001a40)='./file0\x00', 0x0) mount(&(0x7f0000000440)=@loop={'/dev/loop', 0x0}, &(0x7f0000000480)='./file0\x00', 0x0, 0xb801, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 02:49:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8001000000000000, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x8, 0x3, 0x388, 0x1d0, 0x0, 0x148, 0x0, 0x0, 0x2f0, 0x2a8, 0x2a8, 0x2f0, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x188, 0x1d0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'bond_slave_1\x00', {0x0, 0x0, 0x3, 0x0, 0x0, 0x20000003, 0x7}}}, @common=@unspec=@string={{0xc0}, {0x0, 0x0, 'fsm\x00', "0595c0ef8a42e1681c52a599943b9f8f033e74ab9ce28aede436cd2f3fbc3a03d976f1cb8fd234ded36ecd7f496b02d09e656b1143ec9563831bf050c9c1531fa2131c5ad4fd5590e611ddc86f36b139e030448087b0a74c9c1c39384ab02542529f918bd408c47ae528444cdbe57e6280909f0cf3ee900f29bc4d1d8e4b15ee"}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'pptp\x00'}}}, {{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@socket0={{0x20}}, @common=@ah={{0x30}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="40439101dde1"}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3e8) 02:49:31 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e002030029000505d25a80648c63940d0424fc60100011400a000000013582c137153e370848018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 02:49:31 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xd3, 0x0, &(0x7f0000000000)=0x4) 02:49:31 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x60, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 672.978819][T30187] netlink: 'syz-executor.1': attribute type 11 has an invalid length. 02:49:31 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x4) 02:49:31 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @loopback}]}]}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x50}}, 0x0) 02:49:31 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) close_range(r0, 0xffffffffffffffff, 0x4) [ 673.032107][T30187] netlink: 178868 bytes leftover after parsing attributes in process `syz-executor.1'. 02:49:31 executing program 4: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) poll(0x0, 0x0, 0x400007f) mkdir(&(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(0x0, 0x30900, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 02:49:31 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0x92, 0x0, &(0x7f0000000000)=0x4) 02:49:34 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@ptr, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x7b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:49:34 executing program 1: clone3(&(0x7f0000002540)={0x28100400, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000002500)=[0x0], 0x1}, 0x58) 02:49:34 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) 02:49:34 executing program 5: r0 = syz_io_uring_setup(0x5de6, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000380)=0x0, &(0x7f0000000100)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000008540)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0}, 0x10001) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ee7000/0x3000)=nil, 0x3000, 0x6, 0x11, r0, 0x10000000) syz_io_uring_submit(r1, r3, &(0x7f0000000340)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000000)=@IORING_OP_SYNC_FILE_RANGE, 0x0) r4 = mmap$IORING_OFF_SQES(&(0x7f00000da000/0x4000)=nil, 0x4000, 0x3, 0x12, r0, 0x10000000) syz_io_uring_submit(r1, r4, &(0x7f0000000140)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@initdev, @in=@multicast1}}, {{@in6}, 0x0, @in=@empty}}, &(0x7f00000000c0)=0xe8) syz_io_uring_submit(r1, r4, &(0x7f00000001c0)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000280)=@IORING_OP_ASYNC_CANCEL={0xe, 0x1, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}, 0x0) syz_io_uring_submit(r1, r4, &(0x7f0000000240)=@IORING_OP_FADVISE, 0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000040)=@IORING_OP_POLL_REMOVE, 0x0) r5 = fork() setpgid(r5, 0x0) waitid(0x2, r5, 0x0, 0x40000009, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180), 0x802, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 02:49:34 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xe) shutdown(r0, 0x2) 02:49:34 executing program 4: unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) poll(0x0, 0x0, 0x400007f) mkdir(&(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(0x0, 0x30900, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 02:49:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000002c0), 0xffffffffffffffff) r2 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r1, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r2}]}, 0x3c}}, 0x0) 02:49:34 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700000000ff03000000000010", @ANYRES32=r2, @ANYBLOB="00000000e60000001c0012400c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r5}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x10}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001000250800000000000000000a000000", @ANYRES32=r5, @ANYBLOB="10"], 0x2c}}, 0x0) 02:49:34 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) r1 = openat(0xffffffffffffffff, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000980)="b0ff02c66b0d698cb89e2fe088ca1f74ffff10000000630677fbac14140ce0", 0x0, 0x0, 0xe8030000, 0x0, 0x0, 0x0, 0x0}, 0x48) 02:49:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001400)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @sit={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IFLA_IPTUN_6RD_PREFIXLEN={0x6, 0xd, 0xfe00}]}}}]}, 0x40}}, 0x0) 02:49:34 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040), 0x4) syz_usb_connect(0x0, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xa, 0x9d, 0x12, 0x40, 0xb05, 0x17d0, 0x3d5a, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x73, 0xa5, 0x24}}]}}]}}, 0x0) [ 676.167558][T30264] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 676.226468][T30301] 8021q: adding VLAN 0 to HW filter on device bond1 [ 676.265446][T30301] team0: Port device bond1 added 02:49:34 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r3, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) [ 676.288477][T30264] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 676.433635][T30301] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 676.546146][ T7750] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 677.066736][ T7750] usb 4-1: New USB device found, idVendor=0b05, idProduct=17d0, bcdDevice=3d.5a [ 677.075987][ T7750] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 677.085150][ T7750] usb 4-1: Product: syz [ 677.089865][ T7750] usb 4-1: Manufacturer: syz [ 677.094452][ T7750] usb 4-1: SerialNumber: syz [ 677.101911][ T7750] usb 4-1: config 0 descriptor?? [ 677.363283][ T8499] usb 4-1: USB disconnect, device number 2 02:49:37 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@ptr, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x7b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:49:37 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000001000000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x9a, &(0x7f0000000000)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='sys_enter\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000140)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x4, 0x9a, &(0x7f0000000000)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='sys_enter\x00', r1}, 0x10) 02:49:37 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, 0x0) 02:49:37 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x1b, 0x5b, 0x8, 0x7, 0x31, 0x32, 0x0, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 02:49:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) getsockname(r2, &(0x7f00000000c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000140)=0x80) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x34, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=@bridge_delvlan={0x18, 0x70, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r3}}, 0x18}}, 0x0) 02:49:37 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xaf, 0x0, &(0x7f0000000000)=0x4) 02:49:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=@bridge_delvlan={0x12, 0x70, 0x1}, 0x18}}, 0x0) 02:49:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200)=0x9000000, 0x43408) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100), 0x800, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x3b64215f45987a23, 0xe, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8}, [@exit, @btf_id={0x18, 0x9, 0x3, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x7, 0x5, 0x5, 0x100, 0xffffffffffffffff}, @map_val={0x18, 0xb, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x200}, @map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000000)='GPL\x00', 0x5c8e, 0x5, &(0x7f0000000080)=""/5, 0x20800, 0x1f, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000340)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x3, 0x4, 0x4, 0x8000}, 0x10}, 0x78) 02:49:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001400)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LOCAL={0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}]}}}]}, 0x38}}, 0x0) 02:49:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x28a) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3800000010000507000200b5a55b7d0a9b8a5400", @ANYRES32, @ANYBLOB="19000016010000001800120008000100736974000c00020008000300", @ANYRES32=r2], 0x38}}, 0x0) 02:49:37 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000040)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x600}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @loopback}]}]}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x50}}, 0x0) 02:49:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x80000001}) r2 = socket$unix(0x1, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000240)={0x6}) r3 = syz_io_uring_setup(0x3ede, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x5}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r3, 0x2ff, 0x0, 0x0, 0x0, 0x0) 02:49:40 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@ptr, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x7b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:49:40 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x3f00, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e072403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 02:49:40 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) close_range(r0, 0xffffffffffffffff, 0x0) 02:49:40 executing program 5: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000800)={0x0, 0x3, &(0x7f0000000040)={&(0x7f0000003840)=@newqdisc={0x30, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7}, {0x4}}]}, 0x30}}, 0x0) 02:49:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000003900190100000000000000000300000024a41c000c0001800600060088"], 0x24}}, 0x0) 02:49:40 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xdc16}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x24, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x40) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x80104592, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "ed005400000000003ec13e20000000eb00df0000000000001f00"}) 02:49:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=@newtfilter={0x30, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x2}}, [@filter_kind_options=@f_bpf={{0x8}, {0x4}}]}, 0x30}}, 0x0) [ 682.128891][T30400] netlink: 'syz-executor.3': attribute type 1 has an invalid length. [ 682.153536][T30401] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 02:49:40 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x11) perf_event_open(&(0x7f0000002500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x2, 0x0, @mcast2, 0x31}, 0x80, &(0x7f0000000340)}, 0x0) 02:49:40 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) [ 682.188835][T30401] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 682.218581][T30401] bridge0: port 2(bridge_slave_1) entered disabled state [ 682.225841][T30401] bridge0: port 1(bridge_slave_0) entered disabled state 02:49:40 executing program 4: bind$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @loopback}]}]}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x50}}, 0x0) [ 682.269043][T30401] device bridge0 entered promiscuous mode 02:49:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x2d, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) openat$mice(0xffffffffffffff9c, 0x0, 0x0) getpeername$llc(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x20, 0x0, &(0x7f0000000980)="b0ff02c66b0d698cb89e2fe088ca1f74ffff10000000630677fbac14140ce005", 0x0, 0x2f, 0xe8030000, 0x0, 0x0, 0x0, 0x0}, 0x48) 02:49:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000001000000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x9a, &(0x7f0000000000)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='sys_enter\x00', r1}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000001000000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x9a, &(0x7f0000000000)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='sys_enter\x00', r3}, 0x10) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x11, r2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000300)='scalable\x00', 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, 0x0, "a8602260b7e5bfa2eb314a26f090eb342988186f5e1a3b008819d836aaf7053e6b4154cf347082dd391ebeda60df538daabb6eadef58b8b7e47270f18fc04e3b014bfd0f58e52ab1ba3c011619c98aef"}, 0xd8) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) [ 682.538709][T30432] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 682.613997][T30416] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 682.650489][T30401] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 682.662966][T30401] bridge0: port 2(bridge_slave_1) entered blocking state [ 682.670218][T30401] bridge0: port 2(bridge_slave_1) entered forwarding state [ 682.677619][T30401] bridge0: port 1(bridge_slave_0) entered blocking state [ 682.684696][T30401] bridge0: port 1(bridge_slave_0) entered forwarding state [ 682.695413][T30401] device bridge0 left promiscuous mode [ 682.704004][T30421] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 683.675703][ T8129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 02:49:43 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@ptr, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x7b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:49:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000001000000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x9a, &(0x7f0000000000)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='sys_enter\x00', r1}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000001000000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x9a, &(0x7f0000000000)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='sys_enter\x00', r3}, 0x10) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x11, r2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000300)='scalable\x00', 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, 0x0, "a8602260b7e5bfa2eb314a26f090eb342988186f5e1a3b008819d836aaf7053e6b4154cf347082dd391ebeda60df538daabb6eadef58b8b7e47270f18fc04e3b014bfd0f58e52ab1ba3c011619c98aef"}, 0xd8) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) 02:49:43 executing program 4: bind$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @loopback}]}]}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x50}}, 0x0) 02:49:43 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) 02:49:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=@newtfilter={0x30, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x2}}, [@filter_kind_options=@f_bpf={{0x8}, {0x4}}]}, 0x30}}, 0x0) 02:49:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000003b00)={0x0, 0x0, &(0x7f0000003ac0)={&(0x7f0000000400)={0x28, r1, 0x203, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}]}]}, 0x28}}, 0x0) 02:49:43 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000040)={0x0, 'veth1_vlan\x00', {}, 0x7}) getsockopt$inet_int(r0, 0x10d, 0x0, 0x0, &(0x7f0000000000)) 02:49:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$befs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000880)=[{&(0x7f0000000140)}, {0x0}, {0x0}], 0x0, &(0x7f0000000980)={[{'v7\x00'}, {'v7\x00'}], [{@euid_gt}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x39, 0x61, 0x0, 0x38, 0x65, 0x38], 0x2d, [0x0, 0x34], 0x2d, [0x0, 0x37], 0x2d, [0x66, 0x0, 0x0, 0x31], 0x2d, [0x35, 0x0, 0x0, 0x61, 0x0, 0x61]}}}]}) 02:49:43 executing program 4: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000200), 0x84100) [ 685.292198][T30473] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 02:49:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000001000000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x9a, &(0x7f0000000000)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='sys_enter\x00', r1}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000001000000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x9a, &(0x7f0000000000)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='sys_enter\x00', r3}, 0x10) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x11, r2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000300)='scalable\x00', 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, 0x0, "a8602260b7e5bfa2eb314a26f090eb342988186f5e1a3b008819d836aaf7053e6b4154cf347082dd391ebeda60df538daabb6eadef58b8b7e47270f18fc04e3b014bfd0f58e52ab1ba3c011619c98aef"}, 0xd8) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) [ 685.369042][T30481] befs: Unrecognized mount option "v7" or missing value [ 685.382309][T30481] befs: (loop2): cannot parse mount options 02:49:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x24, r1, 0x105, 0x0, 0x0, {}, [@L2TP_ATTR_SESSION_ID={0x8}, @L2TP_ATTR_CONN_ID={0x8}]}, 0x24}}, 0x0) 02:49:43 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000040)={0x0, 'veth1_vlan\x00', {}, 0x7}) getsockopt$inet_int(r0, 0x10d, 0x0, 0x0, &(0x7f0000000000)) [ 685.426533][ T1372] ieee802154 phy0 wpan0: encryption failed: -22 [ 685.433080][ T1372] ieee802154 phy1 wpan1: encryption failed: -22 02:49:46 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@ptr, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x7b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:49:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=ANY=[@ANYBLOB="3c00000024000b0f00000000e4ff000000000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000b00010064736d61726b00000c0002000600010020"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=@newtfilter={0x30, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x2}}, [@filter_kind_options=@f_bpf={{0x8}, {0x4}}]}, 0x30}}, 0x0) 02:49:46 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0x83, 0x0, &(0x7f0000000000)=0x4) 02:49:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f00000004c0)={{0x1b, 0x5b, 0x8, 0x7, 0x0, 0x32, 0x0, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 02:49:46 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000040)={0x0, 'veth1_vlan\x00', {}, 0x7}) getsockopt$inet_int(r0, 0x10d, 0x0, 0x0, &(0x7f0000000000)) 02:49:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000001000000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x9a, &(0x7f0000000000)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='sys_enter\x00', r1}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000001000000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x9a, &(0x7f0000000000)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='sys_enter\x00', r3}, 0x10) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x11, r2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x7654}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000300)='scalable\x00', 0x9) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, 0x0, "a8602260b7e5bfa2eb314a26f090eb342988186f5e1a3b008819d836aaf7053e6b4154cf347082dd391ebeda60df538daabb6eadef58b8b7e47270f18fc04e3b014bfd0f58e52ab1ba3c011619c98aef"}, 0xd8) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) [ 688.322878][T30531] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 02:49:46 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000003100)={&(0x7f0000000000)=ANY=[@ANYBLOB="380000000b0601"], 0x38}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r3, 0x8912, 0x400308) sendfile(r2, r1, 0x0, 0x800100000004) 02:49:46 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(&(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 02:49:46 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000010c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000500)="b9ff0300600d698cb89e14f065581fffffff07004000058477fbac14140ee9", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 02:49:46 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000040)={0x0, 'veth1_vlan\x00', {}, 0x7}) getsockopt$inet_int(r0, 0x10d, 0x0, 0x0, &(0x7f0000000000)) 02:49:46 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r0, 0x8982, 0x0) 02:49:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000013c0)={&(0x7f0000001340)={0x64, r1, 0x1, 0x0, 0x0, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0xfffffffffffffce0}, {0x6}, {0x5}, {0x6}, {0x8}}]}, 0x64}}, 0x0) [ 688.574769][ T25] audit: type=1804 audit(1628822986.642:135): pid=30564 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir099468159/syzkaller.RzkR39/930/cgroup.controllers" dev="sda1" ino=14493 res=1 errno=0 [ 688.615354][T30559] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 688.661820][T30570] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. [ 688.696634][T30571] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. 02:49:49 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@ptr, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x7b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:49:49 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) mkdir(&(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 02:49:49 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000040)={0x0, 'veth1_vlan\x00', {0x2}, 0x7}) getsockopt$inet_int(r0, 0x10d, 0x0, 0x0, &(0x7f0000000000)) 02:49:49 executing program 3: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xbd, 0x0, &(0x7f0000000000)=0x4) 02:49:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) wait4(0x0, 0x0, 0x4, 0x0) 02:49:49 executing program 5: timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)=0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x31, 0x0, 0x0) timer_settime(r0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r2 = dup(r1) readv(r2, &(0x7f0000000100)=[{&(0x7f0000000380)=""/160, 0xa0}], 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.memory_pressure\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) 02:49:49 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000100)="ba", 0x1) 02:49:49 executing program 1: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 02:49:49 executing program 3: perf_event_open(&(0x7f00000016c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 02:49:49 executing program 4: perf_event_open(&(0x7f00000016c0)={0x2, 0x80, 0x4a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:49:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000000c0)={0x0, 0x600, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250306000e072403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 02:49:49 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x7, 0x6d, 0x7ff}, 0x40) recvmsg(0xffffffffffffffff, &(0x7f0000007500)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d40)=ANY=[@ANYBLOB="700000000000000029000000bf00000014c09bb5a017068735136c0284860e72bc266af7d9e2f7f2cbad0394a96dc8c92080eee56f511920f7d1ced22adbe930200153e2ddb7003bc7d33bcde4c6e2bcac0051d7224fe7573c8121a57333cc81fe28b2a6fe9f2faa5ccd160000000000f0000000000000001101000003000000be50503e3c170975d5b8a99e627d0b98e0277cc256111982699b4116795f400bea266bfa521c81394d77"], 0x1b0}, 0x24008481) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0xc9478da2}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000038e80)={&(0x7f00000379c0)=@xdp, 0x80, &(0x7f0000038d80)=[{&(0x7f0000038a40)=""/240, 0xf0}, {&(0x7f0000038b40)=""/234, 0xea}, {&(0x7f0000038c40)=""/89, 0x59}, {0x0}, {&(0x7f0000038d40)=""/16, 0x10}], 0x5, &(0x7f0000038e00)=""/72, 0x48}, 0x102) bpf$PROG_LOAD(0x5, &(0x7f0000001a40)={0x8, 0x6, &(0x7f0000000640)=@raw=[@jmp={0x5, 0x1, 0x6, 0x6, 0x0, 0xffffffffffffffc0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @alu={0x4, 0x0, 0x0, 0x3, 0x3, 0xfffffffffffffff8}, @map_val={0x18, 0x1}, @alu={0x0, 0x1, 0x7, 0x4, 0x9, 0xc, 0xffffffffffffffff}], &(0x7f00000005c0)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41100, 0x12, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f00000019c0)={0x0, 0x3}, 0x8, 0x10, 0x0}, 0x78) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="9febe60018000000000000002400000024000000020000000000000001000004080000000000000002000000000000000000000000000004f6b8625c56805d8042c64af4a06eec211a20d9b09e19af5f949c23e1d7eeef4b7045e9e7313d62fc1c3a6d1593a60be66ecfd457b0570f731792ffd10efe6053c289a13c1f5bc0dd03ac9bb8e5a29e86b65cc216b02c61d13ac0560b"], &(0x7f0000000080)=""/236, 0x3e, 0xec, 0x7}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000240), &(0x7f0000000000), 0x80000001, r0}, 0x38) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x19, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140), &(0x7f0000000140), 0xbcc4, r0}, 0x38) [ 691.668716][T30616] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 691.699788][T30616] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 691.720930][T30616] bridge0: port 2(bridge_slave_1) entered disabled state [ 691.728215][T30616] bridge0: port 1(bridge_slave_0) entered disabled state [ 691.760648][T30616] device bridge0 entered promiscuous mode [ 692.092590][T30616] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 692.108313][T30616] bridge0: port 2(bridge_slave_1) entered blocking state [ 692.115892][T30616] bridge0: port 2(bridge_slave_1) entered forwarding state [ 692.123371][T30616] bridge0: port 1(bridge_slave_0) entered blocking state [ 692.130901][T30616] bridge0: port 1(bridge_slave_0) entered forwarding state [ 692.182316][T30616] device bridge0 left promiscuous mode [ 692.198880][T30634] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 692.212918][T30634] bridge0: port 2(bridge_slave_1) entered disabled state [ 692.220156][T30634] bridge0: port 1(bridge_slave_0) entered disabled state [ 692.269813][T30634] device bridge0 entered promiscuous mode 02:49:52 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x7b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:49:52 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8bffffd79a4f0ff00000000b7060000ffffffff2d640500000000006504040001001f000404000001007d60b7030000000000006a0a00fefdff0000850000000d000000b7000000000000009500000000000000c74396c8e3ebbadc20e5a7ef8c9ac1465c3a1f59916ffc9bf00000000000000000cf8dcf819b5c0c00000000000090af27db5b56024df96b4673b4e8d5467e3554508535766c80114604eab9b290a248a1a0c9c6e39f403ff065fd3052aae80677eeba68562eaeaea5fecf298ca20f274233106e2baf69b1c66c01e4099f366b89ab63ecf92b2704550a4d1dd5c50b7420b48a93fe94c756108afcd0b2eb785632e0a85f02a5a6474ae549070000000000000094fba0ed5020e6477cc921fee5f6d8ad6a80d0947cd6d4a561ced23b0b4a902be6af7ec2d1ba00000000000000000000000000000000008ca7dfee7f4b413568bca3b4ab3b21753a83f86c1df4d3f50d507b15b15b7a80bded0e4a20522ec2eaf182c45a45b60a0eb68554c97540187ebc2a5f5f29108dc68654697130ad18cf4a595091d12ff51b35b74f39ea2850b0318f11e08ccd24"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x13a, 0x304, &(0x7f0000000040)="b90103600000f000009e0ff008001fffffe100004000630477fbac141441e0002001be3e7d2a182fff", 0x0, 0x104, 0xa000000, 0x0, 0xfeb9, &(0x7f0000000640)="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", &(0x7f0000000100)}, 0x28) 02:49:52 executing program 1: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 02:49:52 executing program 5: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x2, 0x80540, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) 02:49:52 executing program 2: socketpair(0x10, 0x2, 0x7, &(0x7f0000004740)) 02:49:52 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002440)={0x0, 0x4, &(0x7f0000000000)=@framed={{}, [@alu]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x600, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a484e000d000000e8bd6efb250309000e072403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) [ 694.507970][T30653] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 694.554424][T30653] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. 02:49:52 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000002bc0)={0x0, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000020000000000000009000000183900000400000000000000000000182b0000", @ANYRES32, @ANYBLOB="0040001001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000200)=@l2tp6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000280)="f400110000082c25e926990c7c1b94ef000098d66205baa61454a3f5fbff010300000000821d75d2", 0x30}], 0x1}, 0x0) 02:49:52 executing program 2: perf_event_open(&(0x7f00000016c0)={0x2, 0x4a, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 694.969816][T30653] bridge0: port 2(bridge_slave_1) entered disabled state [ 694.977124][T30653] bridge0: port 1(bridge_slave_0) entered disabled state [ 694.992098][T30653] device bridge0 entered promiscuous mode 02:49:53 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x13a, 0x304, &(0x7f0000000040)="b90103600000f000009e0ff008001fffffe100004000630477fbac141441e0002001be3e7d2a182fff", 0x0, 0x104, 0xa000000, 0x0, 0xfeb9, &(0x7f0000000640)="9209558f0c5fb25cd57f98113135c3171b8b331fbc04f0e6955a796ff8e3aae3cac46cec3030dfc999078aea01f0e6dcf2f9d480d328655aca003927bd50ed49d4843c8a0a2a4b26ceb747947200bd644c85e7a8a7d7cfce840c02a7d69c9e0bca410f64d43290abbbf3131e1fa8bd8c3e5f19d5a491d3d4c1a0fe47de9eebaf073ac3da6256bdb681d18fbd607c9b0d710442bcf78bc36fd3c035812bde582a262bff0e4d6181c818fccf542868c6e602d97bea23a101955dc76bcc984142ab305387aa348566d688edd291a3e9d08952adbdf60462bb7f7faebcdfccf17115708b0d73d0f3a469ce7d8374219b3f92c92bcec4958d474bb281c26691949d054b784a5866f081e53eb9cfd7", &(0x7f0000000100)}, 0x28) [ 695.227798][T30653] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. [ 695.250238][T30653] bridge0: port 2(bridge_slave_1) entered blocking state [ 695.257396][T30653] bridge0: port 2(bridge_slave_1) entered forwarding state [ 695.264773][T30653] bridge0: port 1(bridge_slave_0) entered blocking state 02:49:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r0, &(0x7f0000000600)={&(0x7f00000001c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x801, &(0x7f0000000380)=[{&(0x7f0000000640)="80", 0x11524}], 0x1, 0x0, 0x0, 0xf00}, 0xfc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) [ 695.271867][T30653] bridge0: port 1(bridge_slave_0) entered forwarding state [ 695.326798][T30653] device bridge0 left promiscuous mode [ 695.333843][T30685] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.3'. 02:49:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x60a, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e072403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xffffff7f}, 0x10) 02:49:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r0, &(0x7f0000000600)={&(0x7f00000001c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x801, &(0x7f0000000380)=[{&(0x7f0000000640)="80", 0x11524}], 0x1, 0x0, 0x0, 0xf00}, 0xfc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) [ 695.674716][T30685] bridge0: port 2(bridge_slave_1) entered disabled state [ 695.681956][T30685] bridge0: port 1(bridge_slave_0) entered disabled state [ 695.714076][T30685] device bridge0 entered promiscuous mode [ 695.924853][T30694] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.4'. [ 695.951564][T30699] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.4'. [ 695.999808][T30699] bridge0: port 2(bridge_slave_1) entered disabled state [ 696.011346][T30699] bridge0: port 1(bridge_slave_0) entered disabled state [ 696.033345][T30699] device bridge0 entered promiscuous mode [ 696.229304][T30694] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.4'. [ 696.247231][T30694] bridge0: port 2(bridge_slave_1) entered blocking state [ 696.254340][T30694] bridge0: port 2(bridge_slave_1) entered forwarding state [ 696.261725][T30694] bridge0: port 1(bridge_slave_0) entered blocking state [ 696.268850][T30694] bridge0: port 1(bridge_slave_0) entered forwarding state [ 696.277968][T30694] device bridge0 left promiscuous mode 02:49:55 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x7b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:49:55 executing program 1: socketpair(0x28, 0x5, 0x0, &(0x7f0000001400)) 02:49:55 executing program 3: perf_event_open(&(0x7f00000016c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 02:49:55 executing program 2: r0 = perf_event_open(&(0x7f00000016c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000000)=ANY=[@ANYBLOB="03002e"]) 02:49:55 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x27, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000bc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x2) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10, 0x0}, 0x0) 02:49:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x60a, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e072403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xffffff7f}, 0x10) [ 697.498665][T30714] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.4'. 02:49:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x27, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 697.542670][T30714] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.4'. [ 697.567791][T30714] bridge0: port 2(bridge_slave_1) entered disabled state [ 697.576856][T30714] bridge0: port 1(bridge_slave_0) entered disabled state 02:49:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {0x0, 0xb}}}, 0x1c}}, 0x0) 02:49:55 executing program 2: add_key(&(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='f', 0x1, 0xffffffffffffffff) [ 697.612909][T30714] device bridge0 entered promiscuous mode 02:49:55 executing program 2: r0 = socket(0x2c, 0x3, 0x0) bind$vsock_stream(r0, 0x0, 0x0) 02:49:55 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x2, 0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40305828, 0x0) 02:49:56 executing program 3: r0 = semget$private(0x0, 0x4, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000080)=[0x5]) semop(r0, &(0x7f0000000040)=[{}, {0x0, 0x1}], 0x2) semctl$IPC_RMID(r0, 0x0, 0xf) [ 698.087709][T30742] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 698.087709][T30742] The task syz-executor.3 (30742) triggered the difference, watch for misbehavior. 02:49:58 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x7b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:49:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x27, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000c40)={&(0x7f0000000bc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}, 0x2) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10, 0x0}, 0x0) 02:49:58 executing program 2: modify_ldt$write(0x1, &(0x7f00000000c0), 0x10) 02:49:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x366, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a4807000d00000009000e00390340d5ae7d0200ff050005", 0x2e}], 0x1, 0x0, 0x0, 0x7000000}, 0x80) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x60a, &(0x7f0000000080)=[{&(0x7f00000002c0)="2e00000010008108040f80ecdb4cb92e0a480e000d000000e8bd6efb250309000e072403240248ff056c05001201", 0x5b}], 0x1, 0x0, 0x0, 0xffffff7f}, 0x10) 02:49:58 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x27, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:49:58 executing program 3: socket$packet(0x11, 0x0, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ptype\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000180)=""/239, 0xef}], 0x1, 0x3f, 0x0) [ 700.547043][T30760] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.4'. [ 700.576028][T30760] bridge0: port 2(bridge_slave_1) entered blocking state [ 700.583228][T30760] bridge0: port 2(bridge_slave_1) entered forwarding state [ 700.590627][T30760] bridge0: port 1(bridge_slave_0) entered blocking state [ 700.598271][T30760] bridge0: port 1(bridge_slave_0) entered forwarding state 02:49:58 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f00000001c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000001c0)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) ioctl$TUNSETTXFILTER(r2, 0x801054db, 0x0) 02:49:58 executing program 2: modify_ldt$write(0x1, &(0x7f00000000c0), 0x10) [ 700.652486][T30760] device bridge0 left promiscuous mode [ 700.660632][ T8658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 700.673363][T30767] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.4'. [ 700.697057][T30767] bridge0: port 2(bridge_slave_1) entered disabled state [ 700.705786][T30767] bridge0: port 1(bridge_slave_0) entered disabled state [ 700.720785][T30767] device bridge0 entered promiscuous mode 02:49:58 executing program 2: modify_ldt$write(0x1, &(0x7f00000000c0), 0x10) 02:49:59 executing program 2: modify_ldt$write(0x1, &(0x7f00000000c0), 0x10) 02:49:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xf, 0x0, 0x0, 0xffffffff}, 0x40) 02:49:59 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) 02:50:01 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x2, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x86}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:50:01 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0), 0x101001, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, 0x0) 02:50:01 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x802, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000040)={0x4, 0x8}, 0x10) 02:50:01 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x5}, 0x40) 02:50:01 executing program 4: getgroups(0x1, &(0x7f0000000100)=[0xffffffffffffffff]) 02:50:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) r2 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x5) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/exe\x00', 0x0, 0x0) dup2(r3, r1) openat(r3, 0x0, 0x40a300, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42800) r4 = open(0x0, 0x141042, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x80001d00c0d0) 02:50:01 executing program 3: r0 = socket$inet6_sctp(0xa, 0x3, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x29, 0x8, 0x0, 0x0) 02:50:01 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCDELRT(r0, 0x890c, 0x0) 02:50:01 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000014c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000001c00)={0x0, 0x2, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3e025977"}}) [ 703.721981][T30814] warning: process `syz-executor.0' used the obsolete bdflush system call 02:50:01 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) [ 703.779859][T30814] Fix your initscripts? 02:50:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) r2 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x5) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/exe\x00', 0x0, 0x0) dup2(r3, r1) openat(r3, 0x0, 0x40a300, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42800) r4 = open(0x0, 0x141042, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x80001d00c0d0) 02:50:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) r2 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x5) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/exe\x00', 0x0, 0x0) dup2(r3, r1) openat(r3, 0x0, 0x40a300, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42800) r4 = open(0x0, 0x141042, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x80001d00c0d0) [ 703.900462][T30827] Cannot find add_set index 0 as target [ 703.926709][T30830] Cannot find add_set index 0 as target 02:50:04 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000000)={0x3, 0x0, "cf5e56", 0x5c, 0x8}) 02:50:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) r2 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x5) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/exe\x00', 0x0, 0x0) dup2(r3, r1) openat(r3, 0x0, 0x40a300, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42800) r4 = open(0x0, 0x141042, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x80001d00c0d0) 02:50:04 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x2, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x86}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:50:04 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) 02:50:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) r2 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x5) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/exe\x00', 0x0, 0x0) dup2(r3, r1) openat(r3, 0x0, 0x40a300, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42800) r4 = open(0x0, 0x141042, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x80001d00c0d0) 02:50:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) r2 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x5) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/exe\x00', 0x0, 0x0) dup2(r3, r1) openat(r3, 0x0, 0x40a300, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42800) r4 = open(0x0, 0x141042, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x80001d00c0d0) [ 706.709660][T30854] Cannot find add_set index 0 as target 02:50:04 executing program 2: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000080)={0x0, 0xc, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "d92b9b97"}, 0x0, 0x0, @planes=0x0}) 02:50:05 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) [ 706.891332][T30860] warning: process `syz-executor.0' used the obsolete bdflush system call [ 706.941822][T30860] Fix your initscripts? 02:50:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) r2 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x5) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/exe\x00', 0x0, 0x0) dup2(r3, r1) openat(r3, 0x0, 0x40a300, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42800) r4 = open(0x0, 0x141042, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x80001d00c0d0) 02:50:05 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) ioctl$sock_bt_hci(r0, 0x8981, &(0x7f0000000080)) [ 707.081905][T30866] Cannot find add_set index 0 as target 02:50:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) r2 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x5) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/exe\x00', 0x0, 0x0) dup2(r3, r1) openat(r3, 0x0, 0x40a300, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42800) r4 = open(0x0, 0x141042, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x80001d00c0d0) 02:50:05 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) 02:50:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) r2 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x5) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/exe\x00', 0x0, 0x0) dup2(r3, r1) openat(r3, 0x0, 0x40a300, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42800) r4 = open(0x0, 0x141042, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x80001d00c0d0) 02:50:05 executing program 2: r0 = getpgrp(0xffffffffffffffff) capget(&(0x7f0000000140)={0x19980330, r0}, &(0x7f0000000100)) [ 707.259018][T30876] Cannot find add_set index 0 as target [ 707.355828][T30881] capability: warning: `syz-executor.2' uses 32-bit capabilities (legacy support in use) 02:50:07 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x2, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}}, 0x0, 0x86}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:50:07 executing program 4: semctl$IPC_RMID(0x0, 0x0, 0x14) 02:50:07 executing program 2: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffe0}}], 0x1, 0x0) 02:50:07 executing program 3: r0 = socket$inet6_sctp(0xa, 0x3, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x29, 0x5, 0x0, 0x300) 02:50:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) r2 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x5) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/exe\x00', 0x0, 0x0) dup2(r3, r1) openat(r3, 0x0, 0x40a300, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42800) r4 = open(0x0, 0x141042, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x80001d00c0d0) 02:50:07 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BLKROTATIONAL(r0, 0x401870c8, 0x0) 02:50:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000240)=ANY=[@ANYBLOB="640000001000390400"/20, @ANYRES32, @ANYBLOB="03040000000000004400128009000100626f6e640000000034000280050010"], 0x64}}, 0x0) 02:50:07 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x4020940d, &(0x7f0000000080)="e6") 02:50:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) r2 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x5) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/exe\x00', 0x0, 0x0) dup2(r3, r1) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) 02:50:08 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x4, &(0x7f00000003c0)=0x7, 0x4) 02:50:08 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000300), r1) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000540)={0x30, r2, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x9effffff00000000}, @NBD_ATTR_SOCKETS={0x4}]}, 0x30}}, 0x0) [ 710.111846][T30916] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.3'. 02:50:08 executing program 5: r0 = semget$private(0x0, 0x2, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000080)=[0x5]) semop(r0, &(0x7f0000000140)=[{}], 0x1) semget$private(0x0, 0x0, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) [ 710.262251][T30916] 8021q: adding VLAN 0 to HW filter on device bond1 02:50:10 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:50:10 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000000c0)={'NETMAP\x00'}, &(0x7f0000000100)=0x1e) 02:50:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) r2 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x5) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/exe\x00', 0x0, 0x0) dup2(r3, r1) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) 02:50:10 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000001180)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x820b}}], 0x20}], 0x1, 0x0) 02:50:10 executing program 3: r0 = socket(0x22, 0x3, 0x0) accept$nfc_llcp(r0, 0x0, 0x0) 02:50:10 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x400448e4, &(0x7f0000000080)) 02:50:11 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @remote, 0xa7, 0x700}}) 02:50:11 executing program 5: r0 = syz_open_dev$swradio(&(0x7f00000001c0), 0x1, 0x2) ioctl$VIDIOC_QBUF(r0, 0xc058560f, 0x0) 02:50:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x1) 02:50:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) r3 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x5) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r4 = openat(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r2) openat(r4, &(0x7f0000000000)='./bus\x00', 0x40a300, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) fcntl$setstatus(r0, 0x4, 0x42800) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) sendfile(r0, r5, 0x0, 0x80001d00c0d0) 02:50:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) r2 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x5) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/exe\x00', 0x0, 0x0) dup2(r3, r1) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) 02:50:11 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x5421, &(0x7f0000000080)) 02:50:14 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:50:14 executing program 5: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc0285628, &(0x7f0000000080)={0x0, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "d92b9b97"}, 0x0, 0x0, @planes=0x0}) 02:50:14 executing program 3: timer_create(0x7, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{}, {0x77359400}}, &(0x7f00000000c0)) 02:50:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) r2 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x5) ftruncate(r2, 0x1000000) sendfile(r1, r2, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r3 = openat(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/exe\x00', 0x0, 0x0) dup2(r3, r1) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80001d00c0d0) 02:50:14 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}, {@in6=@remote, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x96}, [@algo_crypt={0x48, 0x2, {{'cbc(des3_ede)\x00'}}}, @replay_esn_val={0x1c}]}, 0x154}}, 0x0) 02:50:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) r3 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x5) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r4 = openat(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r2) openat(r4, &(0x7f0000000000)='./bus\x00', 0x40a300, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) fcntl$setstatus(r0, 0x4, 0x42800) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) sendfile(r0, r5, 0x0, 0x80001d00c0d0) 02:50:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) r3 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x5) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r4 = openat(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r2) openat(r4, &(0x7f0000000000)='./bus\x00', 0x40a300, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) fcntl$setstatus(r0, 0x4, 0x42800) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) sendfile(r0, r5, 0x0, 0x80001d00c0d0) 02:50:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) r3 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x5) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r4 = openat(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r2) openat(r4, &(0x7f0000000000)='./bus\x00', 0x40a300, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) fcntl$setstatus(r0, 0x4, 0x42800) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) sendfile(r0, r5, 0x0, 0x80001d00c0d0) 02:50:14 executing program 4: r0 = socket$inet6_sctp(0xa, 0x3, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 02:50:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) r3 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x5) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r4 = openat(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r2) openat(r4, &(0x7f0000000000)='./bus\x00', 0x40a300, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) fcntl$setstatus(r0, 0x4, 0x42800) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) sendfile(r0, r5, 0x0, 0x80001d00c0d0) 02:50:14 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BLKROTATIONAL(r0, 0x125f, 0x0) 02:50:14 executing program 4: open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0xa400295c) r2 = open$dir(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat(r2, &(0x7f0000000240)='./file0\x00', r2, &(0x7f0000000140)='./file2\x00') 02:50:17 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr, @union={0x0, 0x7, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0]}}, 0x0, 0x87}, 0x20) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:50:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) r3 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x5) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r4 = openat(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r2) openat(r4, &(0x7f0000000000)='./bus\x00', 0x40a300, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) fcntl$setstatus(r0, 0x4, 0x42800) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) sendfile(r0, r5, 0x0, 0x80001d00c0d0) 02:50:17 executing program 4: r0 = socket$inet6_sctp(0xa, 0x3, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x29, 0x21, 0x0, 0x0) 02:50:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) r3 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x5) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r4 = openat(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r2) openat(r4, &(0x7f0000000000)='./bus\x00', 0x40a300, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) fcntl$setstatus(r0, 0x4, 0x42800) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) sendfile(r0, r5, 0x0, 0x80001d00c0d0) 02:50:17 executing program 2: r0 = socket$inet6_sctp(0xa, 0x3, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x29, 0x32, 0x0, 0x0) 02:50:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) r2 = syz_open_dev$vbi(&(0x7f0000000100), 0x1, 0x2) r3 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x5) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf18001, 0xeefffdef) r4 = openat(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/exe\x00', 0x0, 0x0) dup2(r4, r2) openat(r4, &(0x7f0000000000)='./bus\x00', 0x40a300, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) fcntl$setstatus(r0, 0x4, 0x42800) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) sendfile(r0, r5, 0x0, 0x80001d00c0d0) 02:50:17 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000000)={0x3, 0x0, "cf5e56", 0x5c}) 02:50:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0x2000008c, &(0x7f0000000180)={&(0x7f0000000100)={0x38, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_IP6_DADDR={0x10, 0x20, @local}, @L2TP_ATTR_OFFSET={0x6}, @L2TP_ATTR_MTU]}, 0x38}}, 0x0) 02:50:17 executing program 4: socketpair(0x1e, 0x0, 0x0, &(0x7f00000002c0)) 02:50:17 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$UHID_INPUT2(r1, &(0x7f0000000040)={0xc, {0x2f, "c782eeb5a2d1621d9c6d9ce427c739c37f75d1793ee28524bd874a6f7838f822fb98c5b042eafed302fecee4a28d64"}}, 0x35) bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r1}, 0x8) ioctl$sock_bt_hci(r0, 0x89a1, &(0x7f0000000080)="06") 02:50:17 executing program 2: ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f0000002180)={{}, 0x0, 0x10, @unused=[0x81, 0x400], @name="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"}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)={0x3, [0x0, 0x0, 0x0]}, &(0x7f00000005c0)=0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f00000007c0)={'#! ', './file0', [{0x20, '\x00'}]}, 0xd) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000380), 0x4000000044882, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000000080)=0x4, 0x1) io_setup(0x1, &(0x7f00000004c0)=0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x3f, 0x0, 0x4, 0x0, 0x5, 0x40, 0xe, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x10140, 0x1, 0x5, 0x1, 0x4442, 0x0, 0xff, 0x0, 0x1, 0x0, 0x7}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0), 0xc, &(0x7f00000003c0)={&(0x7f0000000300)=@ipv4_deladdr={0x68, 0x15, 0x200, 0x70bd2b, 0x0, {0x2, 0x80, 0x0, 0xc8}, [@IFA_ADDRESS={0x8, 0x1, @empty}, @IFA_BROADCAST={0x8, 0x4, @private=0xa010102}, @IFA_ADDRESS={0x8, 0x1, @private=0xa010100}, @IFA_CACHEINFO={0x14, 0x6, {0x1, 0x0, 0x1, 0xd0f}}, @IFA_BROADCAST={0x8, 0x4, @empty}, @IFA_BROADCAST={0x8, 0x4, @empty}, @IFA_LABEL={0x14, 0x3, 'veth0_to_batadv\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x20000081}, 0x4008001) io_submit(r1, 0x8, &(0x7f00000000c0)=[&(0x7f0000000140)={0x3a000023, 0x2759, 0xd, 0x0, 0x0, r0, &(0x7f0000000000)="98", 0x3e80000000, 0x1000000}]) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x1b, &(0x7f0000000180)=@assoc_value={r4}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000680)={r4, @in6={{0xa, 0x4e23, 0xfffffffb, @private1={0xfc, 0x1, '\x00', 0x1}}}, [0x80, 0x8, 0x100000001, 0x0, 0x101, 0xfffffffffffffffa, 0x57f, 0x59b, 0x0, 0x20, 0x200, 0x6, 0x0, 0x76d]}, &(0x7f0000000780)=0x100) 02:50:17 executing program 4: perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='nfs4\x00', 0x0, 0x0) [ 719.618668][T31091] BUG: unable to handle page fault for address: fffffffffffffffc [ 719.626430][T31091] #PF: supervisor write access in kernel mode [ 719.632505][T31091] #PF: error_code(0x0002) - not-present page [ 719.638489][T31091] PGD b68f067 P4D b68f067 PUD b691067 PMD 0 [ 719.644503][T31091] Oops: 0002 [#1] PREEMPT SMP KASAN [ 719.649925][T31091] CPU: 1 PID: 31091 Comm: syz-executor.2 Not tainted 5.14.0-rc5-next-20210812-syzkaller #0 [ 719.660017][T31091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.670620][T31091] RIP: 0010:alloc_huge_page+0xdcb/0x11b0 [ 719.676288][T31091] Code: 00 0f 85 6b 03 00 00 48 89 ce 48 89 4a 08 48 b8 00 00 00 00 00 fc ff df 48 c1 ee 03 80 3c 06 00 0f 85 2b 03 00 00 49 8d 7e 10 <49> 89 56 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 [ 719.695917][T31091] RSP: 0018:ffffc90008d7f0a0 EFLAGS: 00010046 [ 719.702001][T31091] RAX: dffffc0000000000 RBX: 0000000000000001 RCX: fffffffffffffffc [ 719.710149][T31091] RDX: ffffea0005228008 RSI: 1fffffffffffffff RDI: 0000000000000004 [ 719.718221][T31091] RBP: ffff88806f89b528 R08: 0000000000000001 R09: 0000000000000001 [ 719.726211][T31091] R10: ffffffff81b71481 R11: 0000000000000000 R12: ffffffff9024fab0 [ 719.734286][T31091] R13: 0000000000000001 R14: fffffffffffffff4 R15: ffffffff9024fb88 [ 719.742272][T31091] FS: 00007fe8052ef700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 719.751222][T31091] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 719.757822][T31091] CR2: fffffffffffffffc CR3: 0000000087883000 CR4: 00000000001506e0 [ 719.765815][T31091] Call Trace: [ 719.769110][T31091] ? restore_reserve_on_error+0x1e0/0x1e0 [ 719.774855][T31091] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 719.781212][T31091] ? rwsem_down_read_slowpath+0x990/0x990 [ 719.786957][T31091] ? hugetlb_total_pages+0x140/0x140 [ 719.792272][T31091] hugetlb_fault+0xf44/0x2500 [ 719.796979][T31091] follow_hugetlb_page+0x414/0x12d0 [ 719.802209][T31091] ? vmacache_find+0x62/0x330 [ 719.807084][T31091] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 719.813372][T31091] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 719.819819][T31091] __get_user_pages+0x276/0xf70 [ 719.824796][T31091] ? follow_page_mask+0x1520/0x1520 [ 719.830027][T31091] ? down_read+0x19a/0x440 [ 719.834472][T31091] ? rwsem_down_read_slowpath+0x990/0x990 [ 719.840405][T31091] get_user_pages_unlocked+0x1b3/0x750 [ 719.846070][T31091] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 719.852257][T31091] ? pin_user_pages_locked+0x830/0x830 [ 719.857742][T31091] ? internal_get_user_pages_fast+0x89d/0x2590 [ 719.864157][T31091] ? internal_get_user_pages_fast+0x8a7/0x2590 [ 719.870421][T31091] internal_get_user_pages_fast+0x1548/0x2590 [ 719.876527][T31091] ? finish_task_switch.isra.0+0x217/0xa20 [ 719.882373][T31091] ? __gup_device_huge+0x3c0/0x3c0 [ 719.887773][T31091] ? first_iovec_segment+0x83/0x2c0 [ 719.893002][T31091] get_user_pages_fast+0x66/0xa0 [ 719.897969][T31091] iov_iter_get_pages+0x163/0xe30 [ 719.903027][T31091] ? __bio_try_merge_page+0x1f5/0x360 [ 719.908496][T31091] ? iter_xarray_populate_pages+0xaa0/0xaa0 [ 719.914413][T31091] ? __bio_try_merge_page+0x216/0x360 [ 719.919894][T31091] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 719.926154][T31091] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 719.932005][T31091] ? iov_iter_advance+0x15f/0xad0 [ 719.937099][T31091] bio_iov_iter_get_pages+0x1f7/0x1430 [ 719.942585][T31091] ? lock_release+0x522/0x720 [ 719.947289][T31091] ? bio_add_zone_append_page+0x2d0/0x2d0 [ 719.953037][T31091] ? iov_iter_npages+0x110/0x690 [ 719.958100][T31091] blkdev_direct_IO+0x98c/0x1320 [ 719.963248][T31091] ? aio_fsync_work+0x340/0x340 [ 719.968176][T31091] ? blkdev_bio_end_io+0x490/0x490 [ 719.973324][T31091] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 719.979495][T31091] generic_file_read_iter+0x25e/0x4f0 [ 719.984884][T31091] blkdev_read_iter+0x127/0x1c0 [ 719.989737][T31091] aio_read+0x2aa/0x460 [ 719.993904][T31091] ? aio_fsync+0x3a0/0x3a0 [ 719.998424][T31091] ? lock_acquire+0x442/0x510 [ 720.003114][T31091] ? rcu_read_lock_sched_held+0xd/0x70 [ 720.008776][T31091] ? __might_fault+0xd3/0x180 [ 720.013453][T31091] ? lock_downgrade+0x6e0/0x6e0 [ 720.018306][T31091] ? io_submit_one+0x1ec/0x1b80 [ 720.023213][T31091] io_submit_one+0xe2b/0x1b80 [ 720.027895][T31091] ? rcu_read_lock_sched_held+0xd/0x70 [ 720.033354][T31091] ? aio_migratepage+0xa00/0xa00 [ 720.038286][T31091] ? rcu_read_lock_sched_held+0xd/0x70 [ 720.043756][T31091] ? lock_release+0x522/0x720 [ 720.048515][T31091] ? __might_fault+0xd3/0x180 [ 720.053496][T31091] ? lock_downgrade+0x6e0/0x6e0 [ 720.058355][T31091] __x64_sys_io_submit+0x18c/0x330 [ 720.063468][T31091] ? __ia32_sys_io_destroy+0x1e0/0x1e0 [ 720.068953][T31091] ? get_vtime_delta+0x26e/0x420 [ 720.073961][T31091] ? syscall_enter_from_user_mode+0x21/0x70 [ 720.079854][T31091] do_syscall_64+0x35/0xb0 [ 720.084268][T31091] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 720.090258][T31091] RIP: 0033:0x4665e9 [ 720.094146][T31091] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 720.113850][T31091] RSP: 002b:00007fe8052ef188 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 720.122359][T31091] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665e9 [ 720.130323][T31091] RDX: 00000000200000c0 RSI: 0000000000000008 RDI: 00007fe8052ce000 [ 720.138398][T31091] RBP: 00000000004bfcc4 R08: 0000000000000000 R09: 0000000000000000 [ 720.146581][T31091] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 720.154543][T31091] R13: 00007ffec82eabff R14: 00007fe8052ef300 R15: 0000000000022000 [ 720.162535][T31091] Modules linked in: [ 720.166420][T31091] CR2: fffffffffffffffc [ 720.175268][T31091] ---[ end trace 77c784a4e05bacd7 ]--- [ 720.180725][T31091] RIP: 0010:alloc_huge_page+0xdcb/0x11b0 [ 720.186360][T31091] Code: 00 0f 85 6b 03 00 00 48 89 ce 48 89 4a 08 48 b8 00 00 00 00 00 fc ff df 48 c1 ee 03 80 3c 06 00 0f 85 2b 03 00 00 49 8d 7e 10 <49> 89 56 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 [ 720.206071][T31091] RSP: 0018:ffffc90008d7f0a0 EFLAGS: 00010046 [ 720.212391][T31091] RAX: dffffc0000000000 RBX: 0000000000000001 RCX: fffffffffffffffc [ 720.220354][T31091] RDX: ffffea0005228008 RSI: 1fffffffffffffff RDI: 0000000000000004 [ 720.228318][T31091] RBP: ffff88806f89b528 R08: 0000000000000001 R09: 0000000000000001 [ 720.236278][T31091] R10: ffffffff81b71481 R11: 0000000000000000 R12: ffffffff9024fab0 [ 720.244258][T31091] R13: 0000000000000001 R14: fffffffffffffff4 R15: ffffffff9024fb88 [ 720.252325][T31091] FS: 00007fe8052ef700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 720.261509][T31091] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 720.268084][T31091] CR2: fffffffffffffffc CR3: 0000000087883000 CR4: 00000000001506e0 [ 720.276047][T31091] Kernel panic - not syncing: Fatal exception [ 720.283694][T31091] Kernel Offset: disabled [ 720.288007][T31091] Rebooting in 86400 seconds..